An ontology-based approach to react to network attacks

Nora Cuppens-Boulahia, Frédéric Cuppens, Jorge E.López De Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) project is defining and designing solutions to enhance the detection/reaction process, improving the overall resilience of IP networks to attacks and help telecommunication and service providers to maintain sufficient quality of service and respect service level agreements. Within this project, a main component is in charge of instantiating new security policies that counteract the network attacks. This paper proposes an ontology-based approach to instantiate these security policies. This technology provides a way to map alerts into attack contexts, which are used to identify the policies to be applied in the network to solve the threat. For this, ontologies to describe alerts and policies are defined, using inference rules to perform such mappings.

Original languageEnglish
Title of host publicationProceedings 2008 3rd International Conference on Risks and Security of Internet and Systems, CRiSIS 2008
Pages27-35
Number of pages9
DOIs
Publication statusPublished - 1 Dec 2008
Externally publishedYes
Event2008 3rd International Conference on Risks and Security of Internet and Systems, CRiSIS 2008 - Tozeur, Tunisia
Duration: 28 Oct 200830 Oct 2008

Publication series

NameProceedings 2008 3rd International Conference on Risks and Security of Internet and Systems, CRiSIS 2008

Conference

Conference2008 3rd International Conference on Risks and Security of Internet and Systems, CRiSIS 2008
Country/TerritoryTunisia
CityTozeur
Period28/10/0830/10/08

Keywords

  • Attack reaction
  • IDMEF
  • OWL
  • Ontology
  • OrBAC
  • Policy instantiation
  • SWRL

Fingerprint

Dive into the research topics of 'An ontology-based approach to react to network attacks'. Together they form a unique fingerprint.

Cite this