Visible to the public Cyberattack Ontology: A Knowledge Representation for Cyber Supply Chain Security

TitleCyberattack Ontology: A Knowledge Representation for Cyber Supply Chain Security
Publication TypeConference Paper
Year of Publication2021
AuthorsYeboah-Ofori, Abel, Ismail, Umar Mukhtar, Swidurski, Tymoteusz, Opoku-Boateng, Francisca
Conference Name2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)
Keywordscompositionality, Computational modeling, Computer crime, cyber security, cyber supply chain, Cyberattack Ontology, Information Reuse, knowledge representation, Ontologies, pubcrawl, Resiliency, security, Semantics, Supply chains, threat intelligence, Vocabulary
AbstractCyberattacks on cyber supply chain (CSC) systems and the cascading impacts have brought many challenges and different threat levels with unpredictable consequences. The embedded networks nodes have various loopholes that could be exploited by the threat actors leading to various attacks, risks, and the threat of cascading attacks on the various systems. Key factors such as lack of common ontology vocabulary and semantic interoperability of cyberattack information, inadequate conceptualized ontology learning and hierarchical approach to representing the relationships in the CSC security domain has led to explicit knowledge representation. This paper explores cyberattack ontology learning to describe security concepts, properties and the relationships required to model security goal. Cyberattack ontology provides a semantic mapping between different organizational and vendor security goals has been inherently challenging. The contributions of this paper are threefold. First, we consider CSC security modelling such as goal, actor, attack, TTP, and requirements using semantic rules for logical representation. Secondly, we model a cyberattack ontology for semantic mapping and knowledge representation. Finally, we discuss concepts for threat intelligence and knowledge reuse. The results show that the cyberattack ontology concepts could be used to improve CSC security.
DOI10.1109/ICCMA53594.2021.00019
Citation Keyyeboah-ofori_cyberattack_2021