PIVOT is designed to be serve transactional op-
erations over single ontology model. To accom-
plish this goal transactional SQL database is adopted
to store ontology model and make dramatic perfor-
mance improvements during I/O operations. Trans-
actional provide also better ontology model integrity.
Client-server architecture allows to share one ontol-
ogy model with multiple users.
PIVOT basic functionalities:
• Searching vulnerabilities matching prompted cri-
teria
• Adding, modifying ontology instances
• Removing ontology instances
• Searching instances that relations matches partic-
ular criteria
Current version of PIVOT allows to establish two
types of connection - the RMI and the HTTP. RMI
(Java Remote Method Invocation API) is a Java ap-
plication programming interface for performing the
remote procedure calls. This type of PIVOT inter-
face was developed to be use with other components
in local network. This gives opportunity to share
ontology among other processes running on remotes
machines. The HTTP interface is developed to per-
form easy OWL model maintenance and management
through the web browser.
PIVOT benefits from easy XML document gen-
eration. This format allows to define own elements
and to help share structured information via network,
what makes PIVOT more universal. That gives oppor-
tunity to create interaction with other systems running
in the network (such as IDS-Intrusion Detection Sys-
tem), that can take advantage from information stored
in ontology and reconfigure if necessary.
4 CONCLUSIONS
In this paper we presented the results of FP7 ICT
Project INTERSECTION.
Firstly, INTERSECTION Vulnerability Database
(IV D) has been developed and described. The major
contribution of this paper is a new approach to vulner-
ability description and handling based on the ontol-
ogy logic. INTERSECTION Vulnerability Ontology
has been motivated and presented in detail. We also
showed how to apply IVO in the security-resiliency
framework. Moreover, PIVOT - ontology-logic based
application has been developed and presented.
Both, IVD and PIVOT, can be used by end-users
such as networks operators and telecoms to share and
use knowledge about vulnerabilities as well as related
threats and attacks affecting heterogeneous, complex
and interconnected networks.
It is worth to mention that identified, classified and
stored vulnerabilities have been provided by opera-
tors involved in the INTERSECTION Project (Polska
Telefonia Cyfrowa, Telefonica, Telespazio). There-
fore, IVD, IVO and PIVOT are based on real-life and
actual information repositories.
ACKNOWLEDGEMENTS
The research leading to these results has received
funding from the European Community’s Seventh
Framework Programme (FP7/2007-2013) under grant
agreement no. 216585 (INTERSECTION Project).
REFERENCES
Chora
´
s M. (Ed.), Deliverable D.2.2 Identification and Clas-
sification of Vulnerabilities of Network Infrastruc-
tures, INTERSECTION Project, July, 2008.
ISO/IEC 13335-1:2004, Information Technology Security
Techniques Management of information and commu-
nications technology security Part 1: Concepts and
models for information and communications technol-
ogy security management.
Shared Information/Data Model (SID), TeleManagement
Forum, October 2002.
OWL Web Ontology Language Semantics and Ab-
stract Syntax, June 2006, http://www.w3.org/TR/owl-
features/.
SWRL: A Semantic Web Rule Language Combning
OWL and RuleML, W3C Member Submission,
http://www.w3.org/Submission/SWRL/.
Chora
´
s M., Renk R., Flizikowski A., Hołubowicz W.
(2008), ”Ontology-based description of networks vul-
nerabilities” , Polish Journal of Environmental Stud-
ies, vol. 5c.
Chora
´
s M., Kozik R., Flizikowski A., Renk R., Hołubowicz
W. (2009), ”Ontology-based Decision Support for Se-
curity Management in Heterogeneous Networks”, In:
Huang, D.-S. et al. (Eds.): Emerging Intelligent Com-
puting Technology and Applications. With Aspects of
Artificial Intelligence, LNAI 5755, Springer.
WEBIST 2010 - 6th International Conference on Web Information Systems and Technologies
174