Russian Foundation of Basic Research (projects
#10-01-00826 and #11-07-00435), the Program of
fundamental research of the Department for
Nanotechnologies and Informational Technologies
of the Russian Academy of Sciences, the State
contract #11.519.11.4008 and by the EU as part of
the SecFutur and MASSIF projects.
REFERENCES
AccelOps, 2011. AccelOps Security Information & Event
Management (SIEM). http://www.accelops.com/
product/siem.php.
AlienVault, 2011. AlienVault Unified SIEM System
description. AlienVault, Campbell, CA. 36 p.
Buecker, A., Amado, J., Druker, D., Lorenz C.,
Muehlenbrock, F., Tan, R., 2010. IT Security
Compliance Management Design Guide with IBM
Tivoli Security Information and Event Manager. IBM
Redbooks.
CIM, 2011. Common Information Model (CIM), DMTF.
Website. http://dmtf.org/standards/ cim.
Elahi, G., Yu, E., Zannone, N., 2009. A Modeling
Ontology for Integrating Vulnerabilities into Security
Requirements Conceptual Foundations. In ER'09 Proc.
28th International Conference on Conceptual
Modeling. Springer-Verlag Berlin, Heidelberg.
Guo, M, Wang, J, 2009. An Ontology-based Approach to
Model Common Vulnerabilities and Exposures in
Information Security. In ASEE Southeast Section
Conference.
Heimbigner, 2011. D. DMTF - CIM to OWL: A Case
Study in Ontology Conversion. http://
www.docstoc.com/docs/23281194/DMTF---CIM-to-
OWL-A-Case-Study-in-Ontology-Conversion.
Ingols, K., Chu, M., Lippmann, R., Webster, S., Boyer, S.,
2009. Modeling modern network attacks and
countermeasures using attack graphs. In Proceedings
of the 2009 Annual Computer Security Applications
Conference (ACSAC ’09), Washington, D.C., USA,
IEEE Computer Society.
Kakas, A., Kowalski, R., Toni, F., 2003. Abductive Logic
Programming. In Journal of Logic and Computation,
V.2, No.6.
Kotenko, I., Stepashkin, M., 2006. Attack Graph based
Evaluation of Network Security. In Lecture Notes in
Computer Science, Vol. 4237, 2006.
Kowalski, R., Sergot, M., 1986. A logic-based calculus of
events. New Generation Computing, V.4.
Li, Z., Chu, C.-H., Yao, W., Behr, R. A., 2010. Ontology-
Driven Event Detection and Indexing in Smart Spaces.
In The 4th IEEE International Conference on
Semantic Computing, September 22-24, Carnegie
Mellon University, Pittsburgh, PA, USA.
López de Vergara, J., Villagrá, V., Berrocal, J., 2004.
Applying the Web Ontology Language to management
information definitions. In IEEE Communications
Magazine. Vol.42, pp.58-74.
Marco, D., Jennings, M., 2004. Universal Meta Data
Models. Wiley.
MASSIF, 2011. Website. http://www.massif-project.eu.
Miller, D., Harris, S., Harper, A., VanDyke, S., Blask, C.,
2011. Security information and event management
(SIEM) implementation. McGraw-Hill Companies.
Novell, 2010. Novell Sentinel Log Manager 1.0.0.5.
Installation Guide.
Ogle, D., Kreger, H., Salahshour, A., Cornpropst, J.,
Labadie, E., Chessell, M., Horn, B., Gerken, J.,
Schoech, J., Wamboldt, M., 2004.
Canonical Situation
Data Format: The Common Base Event V1.0.1.
International Business Machines Corporation.
OWL, 2009. OWL 2 Web Ontology Language Document
Overview. W3C Recommendation 27 October 2009.
http://www.w3.org/TR/owl2-overview .
Parmelee, M, 2010. Toward an Ontology Architecture for
Cyber-Security Standards. The MITRE Corporation.
Parsia, B., 2005. Cautiously Approaching SWRL.
http://en.wikipedia.org/wiki/PDF.
Prelude, 2011. Prelude Pro 1.0. http://www.prelude-
technologies.com/en/welcome/index.html
RDF, 2004. RDF Vocabulary Description Language 1.0:
RDF Schema. W3C Recommendation 10 February
2004. http://www.w3.org/TR/rdf-schema.
SCAP, 2011. The Security Content Automation Protocol
(SCAP). Website. http://scap.nist.gov.
Shenk, J., 2009. ArcSight Logger 4. Combat Cybercrime,
Demonstrate Compliance and Streamline IT
Operations. A SANS Whitepaper. January 2009.
http://www.arcsight.com/collateral/whitepapers/ArcSi
ght_Combat_Cyber_Crime_with_Logger.pdf .
SPARQL, 2008. SPARQL Query Language for RDF.
W3C Recommendation, 15 January 2008.
http://www.w3.org/TR/rdf-sparql-query
SPIN, 2012. ON-THE-FLY, LTL MODEL CHECKING
with SPIN. http://spinroot.com/spin/whatispin.html
Stevens, M, 2005. Security Information and Event
Management (SIEM). In The NEbraskaCERT
Conference, August 9-11, 2005. http://www.certconf.
org/presentations/2005/files/WC4.pdf.
SWRL, 2004. SWRL: A Semantic Web Rule Language
Combining OWL and RuleML. W3C Member
Submission 21 May 2004.
http://www.w3.org/Submission/SWRL/
Teymourian, K., Paschke, A., 2009. Towards Semantic
Event Processing. In Proceedings of the Third ACM
International Conference on Distributed Event-Based
Systems (DEBS '09). ACM. New York.
Triplestore, 2010. Triple Store Evaluation Analysis
Report. Revelytix, Inc.
Vernooy-Gerritsen, M., 2009. Emerging Standards for
Enhanced Publications and Repository Technology.
Amsterdam University Press.
Virtuoso, 2012. http://virtuoso.openlinksw.com
DataRepositoryforSecurityInformationandEventManagementinServiceInfrastructures
313