2020
DOI: 10.1007/978-3-030-59621-7_2
|View full text |Cite
|
Sign up to set email alerts
|

MALOnt: An Ontology for Malware Threat Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(29 citation statements)
references
References 8 publications
0
22
0
Order By: Relevance
“…Ontology modeling is a means to formally model the structure of a system, which is useful for Cyber Threat Intelligence (CTI) analysis. At present, researchers have developed the open ontology for the security of IoT ecosystem elements [17][18][19][20], relating them with existing security concepts, primitives, weaknesses, vulnerabilities, and practices [21][22][23][24]. Researchers have conducted in-depth research on CTI analysis and ontology modeling in cyber security.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Ontology modeling is a means to formally model the structure of a system, which is useful for Cyber Threat Intelligence (CTI) analysis. At present, researchers have developed the open ontology for the security of IoT ecosystem elements [17][18][19][20], relating them with existing security concepts, primitives, weaknesses, vulnerabilities, and practices [21][22][23][24]. Researchers have conducted in-depth research on CTI analysis and ontology modeling in cyber security.…”
Section: Related Workmentioning
confidence: 99%
“…Jia et al [17] built a cyber security ontology based on assets, vulnerabilities, and attacks; they proposed a practical method for constructing a cyber security knowledge graph, and inferred new rules based on the fivetuple model of the cyber security knowledge base. Rastogi et al [18] designed a malware ontology called MALOnt, which contained concepts such as malware characteristics, attack behavior, and detailed information about the attacker. It supported the collection of intelligence on malware threats from different online sources, and built a knowledge graph framework based on MALOnt.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Pingle et al [8] developed a neural network based relationship extractor that works as a classifier to establish relationship between pairs of entities. Recently, more ontologies are being created for CTI representation [17].…”
Section: A Cybersecurity Knowledge Graphsmentioning
confidence: 99%
“…Cyber defense benefits from synergy and cooperation, but sharing and interpreting various threat intelligence reports and databases requires standardized formats and protocols for the analysts to have a common language [14]. Thus, there has been extensive research done for constructing taxonomies and ontologies in order to standardize the formats of linked data on threat intelligence such as software and system vulnerabilities, malware [15], and attacks in general [2,1]. Using these types of ontologies to provide formalism and structure, various framework-type approaches to situational cyber awareness have been developed, for instance for different vulnerabilities, assets and network topologies during cyber attacks [6,16,17,18,4].…”
Section: Related Workmentioning
confidence: 99%