lem the swrlx:makeOWLThing function has been
used, as proposed in (Protégé, 2007).
Once a Hold is obtained, and based on the de-
fined instances of Role, Activity and View, it is also
possible to obtain the policy security rules, indicat-
ing permission, prohibition and obligation. For this,
SWRL rules are also defined. In this case, their
complexity is caused because these rules resemble
the behaviour of MotOrBAC.
6 CONCLUSIONS
This paper has presented a new approach to react to
network attacks in which a set of alerts are used to
automatically generate new security policies. For
this, an ontology-based approach has been used, in
which the alert and the policy information models
can be combined to help in the instantiation of the
policies. The use of OWL and SWRL provides sev-
eral advantages, including the availability of generic
tools for parsing and reasoning. The nature of OWL
as a Semantic Web component allows merging dis-
tributed ontologies. Moreover, there are many works
on mapping different knowledge bases that can be
leveraged for our purpose.
Some issues have also been found when doing
the experimentation. The expressivity of SWRL is
limited, not allowing some logic operators, such as
OR or NOT. Moreover, SWRL supports only mono-
tonic inference, which means that SWRL rules can-
not be used to modify or remove information in the
ontology. This fact reduces the possibility to invali-
date OrBAC holds when a new hold is asserted.
Future works include the validation of the im-
plemented prototype in a test scenario, and integrat-
ing the PIE with the rest of the components in ReD
architecture.
ACKNOWLEDGEMENTS
This paper has been partially funded by the Euro-
pean CELTIC Project ReD (CP3-011). The authors
would like to thank the rest of the partners for their
opinions and ideas.
REFERENCES
A. Abou-El-kalam, P. Balbiani, S. Benferhat, F. Cuppens,
Y. Deswarte, R. El-Baida, A. Miège, C. Saurel, G.
Trouessin, 2003. Organization based access control. In
IEEE 4th International Workshop on Policies for Dis-
tributed Systems and Networks (POLICY 2003), Lake
Como, Italy.
J. M. Bradshaw, A. Uszok, R. Jeffers, N. Suri, P. Hayes,
M. H. Burstein, A. Acquisti, B. Benyo, M. R. Breedy,
M. Carvalho, D. Diller, M. Johnson, S. Kulkarni, J.
Lott, M. Sierhuis, R. Van Hoof, 2003. Representation
and reasoning for DAML-based policy and domain
services in KAoS and Nomad. In Proc. Autonomous
Agents and Multi-Agent Systems Conference (AAMAS
2003), Melbourne, Australia.
C. Coma, N. Cuppens-Boulahia, F. Cuppens, 2007. A
context ontology based approach for secure interop-
erability. In 2007 Workshop of HP Software Univer-
sity Association. HP SUA. Munich, Germany.
N. Damianou, N. Dulay, E. Lupu, M. Sloman, 2001. The
Ponder Policy Specification Language. In Workshop
on Policies for Distributed Systems and Networks
(POLICY2001). Lecture Notes in Computer Science,
Vol. 1995.
H. Debar, D. Curry, B. Feinstein, 2007. The Intrusion
Detection Message Exchange Format (IDMEF). IETF
Request for Comments 4765.
D. Geneiatakis, C. Lambrinoudakis, 2007. An ontology
description for SIP security flaws. Computer Commu-
nications, Vol. 30, Issue 6, pp. 1367-1374
T. R. Gruber, 1993. A Translation Approach to Portable
Ontology Specifications. Knowledge Acquisition, Vol.
5, No. 2, pp. 199-220
A. Guerrero, V. Villagrá, J.E. López de Vergara, A. Sán-
chez-Macián, J. Berrocal:, 2006. Ontology-based Pol-
icy Refinement Using SWRL Rules for Management
Information Definitions in OWL. Lecture Notes in
Computer Science, Vol. 4269, pp. 227-232
I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B.
Grosof, M. Dean, 2004. SWRL: A Semantic Web Rule
Language Combining OWL and RuleML. W3C Mem-
ber Submission.
L. Kagal, T. Finin, A. Johshi, 2003. A Policy Language
for Pervasive Computing Environment. In Proceed-
ings of IEEE 4th International Workshop on Policies
for Distributed Systems and Networks (POLICY 2003),
Lake Como, Italy.
R.A. Martin, 2001. Managing Vulnerabilities in Net-
worked Systems. IEEE Computer Magazine, Vol. 34,
No. 11, pp. 32-38
B. Moore, E. Elleson, J. Strassner, A. Westerinen, 2001.
Policy Core Information Model - Version 1 Specifica-
tion. IETF Request For Comments 3060.
Protégé, 2007. Extensions Built-ins Library, Stanford Uni-
versity. Available at http://protege.cim3.net/cgi-
bin/wiki.pl?SWRLExtensionsBuiltIns.
M. K. Smith, C. Welty, D. L. McGuinness, 2004. OWL
Web Ontology Language Guide. W3C Recommenda-
tion.
J. Undercoffer, A. Joshi, A. Pinkston, 2003. Modeling
computer attacks: an ontology for intrusion detection,
Lecture Notes in Computer Science, Vol. 2820, pp.
113-135.
SECURITY POLICY INSTANTIATION TO REACT TO NETWORK ATTACKS - An Ontology-based Approach using
OWL and SWRL
83