透過您的圖書館登入
IP:18.221.179.220
  • 學位論文

以推論機制探討資訊安全本體之運作

Formalizing Computer Security Incidents Ontology by Rule-Based Mechanism

指導教授 : 劉艾華

摘要


鑑於廣泛使用的資訊科技,資訊安全的議題也逐漸成為研究的焦點。 資訊安全事件的來源可以從不同的事件產生如防火牆日誌檔,入侵偵測系統等等。 針對此類日益劇增的資安事件,對於不僅是使用者甚至是企業都會遭受影響,所以資訊安全的知識在當今的社會中扮演非常重要的角色。事實上,一個小小的資訊安全漏洞往往對組織企業產生莫大的傷害,為了使此種傷害降到最低,本研究提出了明確階層式的資訊安全本體專家系統本研究包含的層級有alert data, attacks, agents, tools, accesses, vulnerabilities and assets,來方便使用者以規則推論可能造成的資安事件和影響的層級,藉由資訊安全規則的使用更能幫助管理者在做資訊安全決策以及解決問題和進行有效的風險管理。

並列摘要


Based on the widely used computer technology, the security incidents have been expanding in an unbelievable fashion. Security incidents can be reflected by different sources, such as firewall logs, intrusion detection systems alerts, and frequency of processors or memory use. By facing this huge volume of information, it’s crucial for people to acknowledge the fact that computer security is playing an important part of our life. As a matter of fact, a slightly little flaw in our information system could be detected by the attackers; furthermore, lead to security disasters that threaten certain organizations or enterprises. For the sake of solving incidents matters precisely, we took into account different sources of possible objects and further analyzed relationship among them such as alert data, attacks, agents, tools, accesses, vulnerabilities and assets. Hence, the conceptual-model of Security Incident Ontology was developed.

參考文獻


[26] 陳志達、江啟賓、民96,以語意網及使用者行為分析強化入侵偵測系統之研究,南台科技大學資訊管理研究所碩士論文
[4] Eriksson, H., “Using JessTab to Integrate Protégé and Jess,” IEEE Intelligent.
[6] Friedman-Hill, E., “Jess in Action:Rule-Based Systems in Java,” Manning Publications , 2003.
[9] Gruber, T. R., “Towards Principles for the Design of Ontologies Used for Knowledge Sharing,” International Journal of Human-Computer Studies, Vol. 43, No. 5-6, 1995, pp. 907-928.
[10] Gruber, T. R., “A Translation Approach to Portable Ontology Specifications,” Knowledge Acquisition, pp.199-220, 1993.

被引用紀錄


涂國慶(2011)。應用商業智慧於網路安全之研究〔碩士論文,大同大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0081-3001201315111712

延伸閱讀