2016
DOI: 10.4018/ijcwt.2016070106
|View full text |Cite
|
Sign up to set email alerts
|

Using an Ontology for Network Attack Planning

Abstract: The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within the cyber domain. The amount of cyber information is increasing constantly and the time that information stays relevant and valuable in decreasing similarly. Thus semantic technologies can contribute towards the intelligent processing of information in this ever-ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
(11 reference statements)
0
2
0
Order By: Relevance
“…An ontology can also be the starting point for visualisations (Sikos, 2023) or useful for different sorts of reasoning (Smith & Ceusters, 2010). van Heerden, et al (2016) describes the benefits of creating a shared vocabulary and also mention as benefits the clarification of domain assumptions and analysing domain knowledge as well as separating this from operational knowledge. Additionally, the implementation of Knowledge Graphs and automated reasoning requires that concepts are grounded which also elevates the relevance of ontologies (Martins, et al, 2022).…”
Section: Introduction To Ontologies and Cybersecuritymentioning
confidence: 99%
See 1 more Smart Citation
“…An ontology can also be the starting point for visualisations (Sikos, 2023) or useful for different sorts of reasoning (Smith & Ceusters, 2010). van Heerden, et al (2016) describes the benefits of creating a shared vocabulary and also mention as benefits the clarification of domain assumptions and analysing domain knowledge as well as separating this from operational knowledge. Additionally, the implementation of Knowledge Graphs and automated reasoning requires that concepts are grounded which also elevates the relevance of ontologies (Martins, et al, 2022).…”
Section: Introduction To Ontologies and Cybersecuritymentioning
confidence: 99%
“…The importance of time in cyberspace has been highlighted by several researchers, such as Phister (2010), Bromander, et al (2020), van Heerden, et al (2016), Morosoff, et al (2015 and Grandin (2023). This also presents constraints to the ontological engineering of an ontology of cyberspace.…”
Section: Introduction To Ontologies and Cybersecuritymentioning
confidence: 99%