Research of applicability of ontology-based approach to building complex information protection systems
DOI:
https://doi.org/10.15587/2312-8372.2016.66462Keywords:
information protection, information and telecommunication systems, ontology, violatorAbstract
Use of ontologies in the field of information protection is discussed and some of the results of our research in this area are given in the article. The main aim of the article is studying the possibility of using ontology-based method to the formal modeling of stages of building complex information protection systems in the information and telecommunication systems. Formalization of building information protection systems will ensure the completeness and consistency of the created models, replicability and repeatability, as well as verification of the approaches to the implementation of protection systems by outside researchers. Presented taxonomy and ontology of violator may serve as an example to other stages of formalizing the building complex information protection systems. Ontology can also be encoded in OWL language and is presented using common tools. Obtained knowledge base can subsequently be used by developers of complex information protection systems to create models of the violator in the specific conditions of operation of information and telecommunication systems.
References
- ISO/IEC 27001:2013. Information technology. Security techniques. Information security management systems. Requirements. (01.10.2013). The British Standards Institution. Available: http://dx.doi.org/10.3403/30126472u
- ND TZI 1.1-003-99. Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu. Order of the Department of Special Telecommunication Systems and Information Protection of Security Service of Ukraine on April 28, 1999 № 22. Available: http://www.dut.edu.ua/uploads/l_1021_47029323.pdf. Last accessed: 14.03.2016.
- ND TZI 3.7-003-05. Poriadok provedennia robit iz stvorennia kompleksnoi systemy zakhystu informatsii v informatsiino-telekomunikatsiinii systemi. Order of the Department of Special Telecommunication Systems and Information Protection of Security Service of Ukraine on November 8, 2005 № 125. Available: http://dstszi.kmu.gov.ua/dstszi/control/uk/publish/article?showHidden=1&art_id=102106&cat_id=46556&ctime=1344502446343. Last accessed: 14.03.2016.
- Antoniuk, A. O., Zhora, V. V. (2010). Teoretychni osnovy modeliuvannia ta analizu system zakhystu informatsii. Irpen: National University of STS of Ukraine, 310.
- Antoniuk, A. O., Zhora, V. V. (2013). Ontolohichnyi pidkhid do vyrishennia zadach zakhystu informatsii. Shestnadtsataia Mezhdunarodnaia nauchno-prakticheskaia konferentsiia «Bezopasnost' informatsii v informatsionno-telekommunikatsionnyh sistemah». Kyiv, 73–74.
- Potii, O. V. (2009). Ontolohichni modeli vlastyvostei zrilosti protsesiv zakhystu informatsii. Applied Radio Electronics, Vol. 8, № 3, 388–395.
- Potii, A. V., Komin, D. S. (2010). Sistemno-ontologicheskii analiz predmetnoi oblasti otsenivaniia garantii informatsionnoi bezopasnosti. Radioelectronic and Computer Systems, 5, 50–56.
- Antoniuk, A. O., Zhora, V. V., Kozhevnykov, I. H. (2014). Vykorystannia ontolohichnoho pidkhodu pry pobudovi modeli zahroz informatsii. Vseukrainska naukovo-praktychna konferentsiia «V. M. Hlushkov – pioner kibernetyky». Kyiv, 187–188.
- DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria. (1985, December). Available: http://fas.org/irp/nsa/rainbow/std001.htm. Last accessed: 15.03.2016.
- Mate Bacic, E. (1990). The Canadian trusted computer product evaluation criteria. Proceedings of the Sixth Annual Computer Security Applications Conference. Institute of Electrical & Electronics Engineers (IEEE), 188–196. doi:10.1109/csac.1990.143768
- Ekelhart, A., Fenz, S., Klemen, M. D., Weippl, E. R. (2006). Security Ontology: Simulating Threats to Corporate Assets. Lecture Notes in Computer Science, Vol. 4332, 249–259. doi:10.1007/11961635_17
- Ekelhart, A., Fenz, S., Klemen, M., Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Institute of Electrical & Electronics Engineers, 156a. doi:10.1109/HICSS.2007.478
- Fenz, S., Weippl, E. (2006). Ontology based IT-security planning. 2006 Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing (PRDC’06). Institute of Electrical & Electronics Engineers (IEEE), 389–390. doi:10.1109/prdc.2006.49
- Choi, C., Choi, J., Ko, B., Oh, K., Kim, P. (2012). A Design of Onto-ACM (Ontology based Access Control Model) in Cloud Computing Environments. Information Leakage Prevention in Emerging Technologies, Vol. 2, № 3/4, 54–64.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Віктор Володимирович Жора
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.