2008 3rd International Conference on Innovative Computing Information and Control 2008
DOI: 10.1109/icicic.2008.579
|View full text |Cite
|
Sign up to set email alerts
|

Towards Automation for Pervasive Network Security Management Using an Integration of Ontology-Based and Policy-Based Approaches

Abstract: With the popularity of heterogeneous network devices and security products, pervasive network security management has been a fashion. However, a chief problem lies in how to characterize various attack scenarios from the viewpoint of both security information and security policies for automation. This paper discusses the potential of applying an integration of ontology-based and policy-based approaches to automate pervasive network security management, and then proposes a model in order to validate the feasibi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
(4 reference statements)
0
3
0
Order By: Relevance
“…Moreover, they do not consider the scenario of sharing a service "Multitenancy" among consumers. Related research efforts in ISMS include risk assessment and management frameworks such as OCTAVE [13], CORAS [14], Security management systems such as policy-based security management [15], Ontology-based and policy based management has been merged in one approach [16], and model-based security management [17]. Most of these approaches focus on the security capturing and enforcement phases rather than the feedback and improvement phases of the SMP.…”
Section: B Cloud Security Managementmentioning
confidence: 99%
“…Moreover, they do not consider the scenario of sharing a service "Multitenancy" among consumers. Related research efforts in ISMS include risk assessment and management frameworks such as OCTAVE [13], CORAS [14], Security management systems such as policy-based security management [15], Ontology-based and policy based management has been merged in one approach [16], and model-based security management [17]. Most of these approaches focus on the security capturing and enforcement phases rather than the feedback and improvement phases of the SMP.…”
Section: B Cloud Security Managementmentioning
confidence: 99%
“…Normally administrators are given the high-level security goals and then, through their knowledge of network topology and security they adopt the best practice and derive the device configurations [9] . Ontology can be used as an alternative to management information because it has formal definition and can enhance semantic expressiveness [13] .…”
Section: Ontology-based Managementmentioning
confidence: 99%
“…Donner [20] defines a standardsbased security ontology, which extends the Common Information Model (CIM) with ontological semantics. The integration of the ontology-based and policy-based approaches is proposed in [13] . The combination of mobile agent technology and the ontology representation of network security knowledge is a promising technique since it offers a lot of advantages, the most important of which is that ontology is machine readable and understandable.…”
Section: Ontology-based Mobile Agent For Nsmmentioning
confidence: 99%