The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Frequent pattern discovery is a hotspot of knowledge discovery, which is based on the hybrid knowledge base that consists of ontology and rule logic. However, the mining efficiency of it is too low and unsatisfying, since the reasoning process needs large quantities of computing. Thus, we need to develop the parallel algorithm and architectures to solve this problem. In this paper, we come up with...
Internet of Things (IoT) brings the third development wave of the global information industry, which makes users, network, and perception devices cooperate more closely. However, if IoT has security problems, it may cause a variety of damage and even threaten human lives and properties. To improve the abilities of monitoring, providing emergency response, and predicting the development trend of IoT...
Network management tasks remain tedious and error-prone, and often require complex reasoning on the part of the network administrator. With KnowNet we address the challenge of reasoning about network management by approaching it as a set of cooperating applications executing over a knowledge graph which captures data and information about the network and the applications that manage and reason over...
Computer networks are becoming more and more important because of variety of services being applied through them, so is the trend of increase of threats to these networks. Traditional approaches of network security like packet filtering, IDS and more advanced IPS suffer from various problems. E.g. These mechanisms are not aware of the resources they are protecting, these mechanisms are independent...
To achieve end-to-end security in a system built from parts, it is important to ensure that the composition of secure components is itself secure. This work investigates the compositionality of two popular conditions of possibilistic noninterference. The first condition, progress-insensitive noninterference (PINI), is the security condition enforced by practical tools like JSFlow, Paragon, sequential...
In the present paper the authors show how the application of Semantic Web technologies, i.e. ontology and rule languages, can be used to describe situations and enhance situation awareness providing also suggested actions to the human operator in a data fusion architecture aimed at airport security. The paper presents the ontology design, i.e. main classes and relationship, and the possible roles...
Nowadays bad adaptive performance of network intrusion prevention system (IPS) becomes the bottleneck of its development in face of complex and fickle attacks. The idea of cognitive network intrusion prevention is creatively put forward to solve the problem in this paper. Three basic problems of the cognitive IPS, knowledge representation, environmental perception and self-learning, are discussed...
The task of specifying and managing security requirements (SR) is a challenging one. Usually SR are often neglected or considered too late - leading to poor design, and cost overruns. Also, there is scarce expertise in managing SR, because most requirements engineering teams do not include security experts, which leads to prevalence of too vague or overly specific SR. In this work, we present an ontology-based...
Current state of the art intrusion detection and prevention systems (IDPS) are signature-based systems that detect threats and vulnerabilities by cross-referencing the threat or vulnerability signatures in their databases. These systems are incapable of taking advantage of heterogeneous data sources for analysis of system activities for threat detection. This work presents a situation-aware intrusion...
We present some lessons identified from FOI experiments on combining sensor data fusion and information fusion. Some ideas for future work are also presented.
This paper introduces a novel sensor information fusion system enabling security and surveillance in large scale sensor saturated urban environments. The system is built over state-of-the art sensor networks middleware and provides information fusion at multiple layers. A distinguishing characteristic of the system is that it support seamless integration with semantic web middleware (including ontologies...
Software requirements, especially non-functional requirements, are considered as vital prerequisites for producing software of high quality. As widely accepted, non-functional goal modeling like the NFR Framework usually employs tree modeling style, and presents an interactive process for the analysis of nonfunctional requirements. However, there still exist some problems during the identification...
Modern system-level security threats have a strongly biological flavor. They are highly distributed and decentralized, continuously evolve around countermeasures, and develop emergent high-level effects out of proportion to the individual efforts of which they are composed. Measures to respond to such threats need to share these characteristics, suggesting techniques such as artificial immune systems,...
Non-functional requirements are considered as vital factors for producing software of better quality. As a widely adopted non-functional requirements analysis framework, the NFR Framework provides a graphical treatment for goal refinement and evaluation. This paper propose a logical representation for the NFR Framework. In addition, an NFR extension operator and an accompanying extension function...
This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is needed to adequately describe, analyze and mitigate a class of probing attacks which allow an adversary to infer any confidential fact within a policy. Two information flow properties that have been studied in the context of state...
P2P files sharing system is popular in network application. The trust evaluation, which is designed for restricting the malicious peers in files sharing system, is often based on reputation. We analyze the reputation system of P2P files sharing, introduce a logic language into the system and prompt some deductive rules according to Game Theory. Finally, we make use of the rules to study the behavior...
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing techniques lack adequate semantics and expressiveness. This paper reviews the existing techniques and proposes threat net; a technique based on information and causality theory concepts which offers improved expressiveness...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.