Skip to main content
Log in

Approach to the construction of the generalized functional-semantic cyber security model

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In this paper, the functional-semantic model of cyber security is proposed as an initial step towards the development of a new unified methodological cyber security basis. This model makes it possible to formalize requirements for confidentiality, integrity, and availability, as well as to obtain ontological knowledge inferences about the system security state.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Klir, Dzh., Sistemologiya. Avtomatizatsiya resheniya sistemnykh zadach (Systemology. Automation for Solving System Tasks), Moscow: Radio i Svyaz’, 1990.

    Google Scholar 

  2. Fonseca, F., Egenhofer, M., Davis, C., and Borges, K., Ontologies and knowledge sharing in Urban GIS, Comput. Environ. Urban. Syst., 2000, no. 24 (3), pp. 232–251.

    Article  Google Scholar 

  3. Blake, B., A Method for Implementing Intention-Based Attack Ontologies with SIEM Software, FishNet, 2014.

    Google Scholar 

  4. Palo Alto Networks® and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats, 2013.

  5. Jansse, T. and Grady, N., Big Data for Combating Cyber Attacks, Semantic Technology for Intelligence, Defense and Security (STID), 2013.

    Google Scholar 

  6. Marques, M., et al., An ontological approach to mitigate risk in web applications, Proceedings of SBSeg, 2014.

    Google Scholar 

  7. Liu, F.-H., et al., Constructing enterprise information network security risk management mechanism by ontology, Tamkang J. Sci. Eng., 2010, vol. 13–1, pp. 79–87.

    Google Scholar 

  8. Kamongi, P., et al., VULCAN: Vulnerability assessment framework for cloud computing, IEEE 7th International Conference, 2013, pp. 218–226.

    Google Scholar 

  9. Wang, J.A. and Minzhe, G.: OVM: An ontology for vulnerability management, CSIIRW, 2009, p. 34.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. D. Zegzhda.

Additional information

Original Russian Text © P.D. Zegzhda, D.P. Zegzhda, T.V. Stepanova, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zegzhda, P.D., Zegzhda, D.P. & Stepanova, T.V. Approach to the construction of the generalized functional-semantic cyber security model. Aut. Control Comp. Sci. 49, 627–633 (2015). https://doi.org/10.3103/S0146411615080192

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080192

Keywords

Navigation