Research of applicability of ontology-based approach to building complex information protection systems

Authors

  • Віктор Володимирович Жора Institute of Software Systems, National Academy of Science of Ukraine, Academician Glushkov av., 40, Kyiv, Ukraine, 03187, Ukraine https://orcid.org/0000-0003-2679-3056

DOI:

https://doi.org/10.15587/2312-8372.2016.66462

Keywords:

information protection, information and telecommunication systems, ontology, violator

Abstract

Use of ontologies in the field of information protection is discussed and some of the results of our research in this area are given in the article. The main aim of the article is studying the possibility of using ontology-based method to the formal modeling of stages of building complex information protection systems in the information and telecommunication systems. Formalization of building information protection systems will ensure the completeness and consistency of the created models, replicability and repeatability, as well as verification of the approaches to the implementation of protection systems by outside researchers. Presented taxonomy and ontology of violator may serve as an example to other stages of formalizing the building complex information protection systems. Ontology can also be encoded in OWL language and is presented using common tools. Obtained knowledge base can subsequently be used by developers of complex information protection systems to create models of the violator in the specific conditions of operation of information and telecommunication systems.

Author Biography

Віктор Володимирович Жора, Institute of Software Systems, National Academy of Science of Ukraine, Academician Glushkov av., 40, Kyiv, Ukraine, 03187

Junior Researcher

Scientific-research department № 1 «Automated information systems»

References

  1. ISO/IEC 27001:2013. Information technology. Security techniques. Information security management systems. Requirements. (01.10.2013). The British Standards Institution. Available: http://dx.doi.org/10.3403/30126472u
  2. ND TZI 1.1-003-99. Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu. Order of the Department of Special Telecommunication Systems and Information Protection of Security Service of Ukraine on April 28, 1999 № 22. Available: http://www.dut.edu.ua/uploads/l_1021_47029323.pdf. Last accessed: 14.03.2016.
  3. ND TZI 3.7-003-05. Poriadok provedennia robit iz stvorennia kompleksnoi systemy zakhystu informatsii v informatsiino-telekomunikatsiinii systemi. Order of the Department of Special Telecommunication Systems and Information Protection of Security Service of Ukraine on November 8, 2005 № 125. Available: http://dstszi.kmu.gov.ua/dstszi/control/uk/publish/article?showHidden=1&art_id=102106&cat_id=46556&ctime=1344502446343. Last accessed: 14.03.2016.
  4. Antoniuk, A. O., Zhora, V. V. (2010). Teoretychni osnovy modeliuvannia ta analizu system zakhystu informatsii. Irpen: National University of STS of Ukraine, 310.
  5. Antoniuk, A. O., Zhora, V. V. (2013). Ontolohichnyi pidkhid do vyrishennia zadach zakhystu informatsii. Shestnadtsataia Mezhdunarodnaia nauchno-prakticheskaia konferentsiia «Bezopasnost' informatsii v informatsionno-telekommunikatsionnyh sistemah». Kyiv, 73–74.
  6. Potii, O. V. (2009). Ontolohichni modeli vlastyvostei zrilosti protsesiv zakhystu informatsii. Applied Radio Electronics, Vol. 8, № 3, 388–395.
  7. Potii, A. V., Komin, D. S. (2010). Sistemno-ontologicheskii analiz predmetnoi oblasti otsenivaniia garantii informatsionnoi bezopasnosti. Radioelectronic and Computer Systems, 5, 50–56.
  8. Antoniuk, A. O., Zhora, V. V., Kozhevnykov, I. H. (2014). Vykorystannia ontolohichnoho pidkhodu pry pobudovi modeli zahroz informatsii. Vseukrainska naukovo-praktychna konferentsiia «V. M. Hlushkov – pioner kibernetyky». Kyiv, 187–188.
  9. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria. (1985, December). Available: http://fas.org/irp/nsa/rainbow/std001.htm. Last accessed: 15.03.2016.
  10. Mate Bacic, E. (1990). The Canadian trusted computer product evaluation criteria. Proceedings of the Sixth Annual Computer Security Applications Conference. Institute of Electrical & Electronics Engineers (IEEE), 188–196. doi:10.1109/csac.1990.143768
  11. Ekelhart, A., Fenz, S., Klemen, M. D., Weippl, E. R. (2006). Security Ontology: Simulating Threats to Corporate Assets. Lecture Notes in Computer Science, Vol. 4332, 249–259. doi:10.1007/11961635_17
  12. Ekelhart, A., Fenz, S., Klemen, M., Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Institute of Electrical & Electronics Engineers, 156a. doi:10.1109/HICSS.2007.478
  13. Fenz, S., Weippl, E. (2006). Ontology based IT-security planning. 2006 Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing (PRDC’06). Institute of Electrical & Electronics Engineers (IEEE), 389–390. doi:10.1109/prdc.2006.49
  14. Choi, C., Choi, J., Ko, B., Oh, K., Kim, P. (2012). A Design of Onto-ACM (Ontology based Access Control Model) in Cloud Computing Environments. Information Leakage Prevention in Emerging Technologies, Vol. 2, № 3/4, 54–64.

Published

2016-03-29

How to Cite

Жора, В. В. (2016). Research of applicability of ontology-based approach to building complex information protection systems. Technology Audit and Production Reserves, 2(2(28), 21–24. https://doi.org/10.15587/2312-8372.2016.66462

Issue

Section

Information Technologies: Original Research