2019
DOI: 10.3390/app9214547
|View full text |Cite
|
Sign up to set email alerts
|

Ontology-Based System for Dynamic Risk Management in Administrative Domains

Abstract: With the increasing complexity of cyberthreats, it is necessary to have tools to understand the changing context in real-time. This document will present architecture and a prototype designed to model the risk of administrative domains, exemplifying the case of a country in real-time, specifically, Spain. In order to carry out this task, a modeling of the assets and threats detected by various sources of information has been carried out. All this information is stored as knowledge making use of ontologies, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The tools used for the ontology development usually incorporate languages that help in the definition of ontologies. We observe that 24% (12 papers) of the relevant documents (Chukkapalli et al, 2020;Vega Barbas et al, 2019;Doynikova et al, 2019;Zheng et al, 2018;Petrenko and Makoveichuk, 2017;Elnagdy et al, 2016;Falk, 2016;Iannacone et al, 2015;Salem and Wacek, 2015;Laskey et al, 2015) report the use of the OWL language (Dean and Schreiber, 2003).…”
Section: Table 5 Ontology Classification By Used Toolsmentioning
confidence: 97%
See 1 more Smart Citation
“…The tools used for the ontology development usually incorporate languages that help in the definition of ontologies. We observe that 24% (12 papers) of the relevant documents (Chukkapalli et al, 2020;Vega Barbas et al, 2019;Doynikova et al, 2019;Zheng et al, 2018;Petrenko and Makoveichuk, 2017;Elnagdy et al, 2016;Falk, 2016;Iannacone et al, 2015;Salem and Wacek, 2015;Laskey et al, 2015) report the use of the OWL language (Dean and Schreiber, 2003).…”
Section: Table 5 Ontology Classification By Used Toolsmentioning
confidence: 97%
“…As shown in Figure 1, the first ontology related to cybersecurity was reported in 2004 (Simmonds et al, 2004), from that year onwards, other works sporadically arise, it is from 2014 that the number of ontologies related to cybersecurity increases, for example in 2019 eleven ontologies were reported (Burita, 2019;Vega Barbas et al, 2019;Gasmi et al, 2019;Doynikova et al, 2019;Scarpato et al, 2019;Niyazova et al, 2019;Islam et al, 2019;Baesso Moreira et al, 2019;Katsantonis et al, 2019;Shaaban et al, 2019;Zamfira et al, 2019). It is worth to note that the relevant papers used in this SLR were subjected to a quality assessment.…”
Section: Executionmentioning
confidence: 99%
“…According to [22] , there is no clear de nition for the notion of more secure, and thus cyber security metrics should be leveraged and integrated in the security assessment. The authors in [23] discuss that traditional approaches normally take a snapshot of an organisation at a given time, at which point cyber security metrics would be generated. Hence, the author in [24] argues that cyber security metrics can be used to benchmark various systems if the conditions of the assessment are maintained.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the authors in [27] found that when the number of vulnerabilities become large, the cyber security metrics' values become static. The authors in [23] argue that a static cyber risk management approach may become obsolete very quickly because many parameters used in the analysis constantly change over time.…”
Section: Related Workmentioning
confidence: 99%
“…Other works only focus on specific physical threats such as flooding [63]. In another hand, cyber incident propagation has been studied in [64] and [65]. The latter focuses on risks in administrative domains.…”
Section: B Incident Propagation Models and Approachesmentioning
confidence: 99%