Repository logo
 
Publication

On the use of ontology data for protecting critical infrastructures

dc.contributor.authorHenriques, João
dc.contributor.authorCaldeira, Filipe
dc.contributor.authorCruz, T.
dc.contributor.authorSimões, P.
dc.date.accessioned2023-07-04T10:50:36Z
dc.date.available2023-07-04T10:50:36Z
dc.date.issued2018
dc.date.updated2023-06-14T15:02:07Z
dc.description.abstractModern societies increasingly depend on products and services provided by Critical Infrastructures (CI) in areas such as energy, telecommunications and transportation, which are considered vital for their wellbeing. These CIs usually rely on Industrial Automation and Control Systems (IACS), which are becoming larger and more complex due to the increasing amount of available heterogeneous data generated by a raising number of interconnected control and monitoring devices and involved processes. The Security Information and Event Management (SIEM) systems in charge of protecting these CI usually collect and process data from specialized sources, such as intrusion detection systems, log sources, honeypots, network traffic analysers and process control software. However, they usually integrate only a small fraction of the whole data sources existing in the CI. Valuable generic data sources such as human resources databases, staff check clocks, outsourced service providers and accounting data usually fall outside the specialized perimeter of SIEM, despite their potential usefulness for achieving a truly holistic perspective on the CI cybersecurity awareness. One of the main reasons for this state of affairs is the difficulty of integrating such data into the SIEM systems, since it is usually dispersed across multiple databases, using different schema and not originally intended for security-related applications. The process of collecting and adapting data from each of those sources would typically require a long and expensive process of conversion from each database. Moreover, since these databases may change over time (e.g. introduction of new Human Resources information systems), the system is difficult not only to setup but also to properly maintain over time. In order to address this gap, in this paper we propose a framework for making this process easier by using a semantic web approach for automated collection and processing of corporate data from multiple heterogeneous sources. This way, it becomes possible to make these data available, at reasonable costs, in a format which is suitable for security management purposes – especially those related with audit compliance and forensic analysispt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.eid2-s2.0-85050829828
dc.identifier.isbn978-191121885-2
dc.identifier.issn20488602
dc.identifier.slugcv-prod-3082698
dc.identifier.urihttp://hdl.handle.net/10400.19/7857
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.publisherCurran Associates Inc.pt_PT
dc.subjectcritical infrastructure protection (CIP)pt_PT
dc.subjectsecurity information and event management (SIEM)pt_PT
dc.subjectindustrial automation and control systems (IACS)pt_PT
dc.subjectsemantic webpt_PT
dc.subjectontologiespt_PT
dc.titleOn the use of ontology data for protecting critical infrastructurespt_PT
dc.typeconference object
dspace.entity.typePublication
oaire.citation.endPage216pt_PT
oaire.citation.startPage208pt_PT
oaire.citation.title17th European Conference on Cyber Warfare and Security, ECCWS 2018pt_PT
person.familyNameMenoita Henriques
person.familyNameCaldeira
person.givenNameJoão Pedro
person.givenNameFilipe
person.identifierhttps://scholar.google.pt/citations?user=AExQrJwAAAAJ
person.identifierlXPmBvYAAAAJ
person.identifier.ciencia-idBB15-BFE2-17AA
person.identifier.ciencia-idCB11-8109-AB1D
person.identifier.orcid0000-0001-7380-9511
person.identifier.orcid0000-0001-7558-2330
person.identifier.scopus-author-id36023210300
rcaap.cv.cienciaidCB11-8109-AB1D | Filipe Caldeira
rcaap.rightsrestrictedAccesspt_PT
rcaap.typeconferenceObjectpt_PT
relation.isAuthorOfPublication9b3258cd-a3d1-46f9-bc04-2bdd99d87014
relation.isAuthorOfPublicatione845705e-5b0b-4f70-9c53-c472ffd768d1
relation.isAuthorOfPublication.latestForDiscovery9b3258cd-a3d1-46f9-bc04-2bdd99d87014

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Artigo_Conf_025.pdf
Size:
761.07 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.82 KB
Format:
Item-specific license agreed upon to submission
Description: