Authors:
Michał Chorás
1
;
Salvatore d’Antonio
2
;
Rafał Kozik
3
and
Witold Hołubowicz
4
Affiliations:
1
ITTI Ltd.; Institute of Telecommunications, University of Technology & Life Sciences, Poland
;
2
Consorzio Interuniversitario Nazionale per l’Informatica CINI, Italy
;
3
Institute of Telecommunications, University of Technology & Life Sciences, Poland
;
4
Adam Mickiewicz University, Poland
Keyword(s):
Network security, Heterogeneous network, Vulnerability database, Ontology management, INTERSECTION.
Related
Ontology
Subjects/Areas/Topics:
Biomedical Engineering
;
Data Engineering
;
Databases and Datawarehouses
;
Enterprise Information Systems
;
Health Information Systems
;
Information Systems Analysis and Specification
;
Internet Technology
;
Knowledge Management
;
Ontologies and the Semantic Web
;
Ontology and the Semantic Web
;
Society, e-Business and e-Government
;
Web Information Systems and Technologies
;
Web Interfaces and Applications
;
Web Security and Privacy
;
XML and Data Management
Abstract:
In this paper our approach to heterogeneous networks vulnerability handling is presented. Vulnerabilities of heterogeneous networks like satellite, GSM/GPRS, UMTS, wireless sensor networks and the Internet have been identified, classified and described in the framework of the European co-funded project, named INTERSECTION (INfrastructure for heTErogeneous, Resilient, SEcure, Complex, Tightly Inter-Operating Networks). Since computer security incidents usually occur across administrative domains and interconnected networks it is quite clear that it would be advantageous for different organizations and network operators to be able to share data on network vulnerabilities. The exchange of vulnerability information and statistics would be crucial for proactive identification of trends that can lead to incident prevention. Network operators have always been reticent to disclose information about attacks on their systems or through their networks. However, this tendency seems to be overcom
e by the new awareness that it is only through cooperation that networking infrastructures can be made robust to attacks and failures. Starting from these considerations, we developed two components, namely INTERSECTION Vulnerability Database (IVD) and Project INTERSECTION Vulnerability Ontology Tool (PIVOT), for vulnerability data management and classification. Both tools will be presented in this paper.
(More)