<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An Ontology for Insider Threat Indicators</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Daniel L. Costa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matthew L. Collins</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Samuel J. Perl</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michael J. Albrethsen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>George J. Silowash</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Derrick L. Spooner</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A. Goals</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>B. The Case for an Ontology</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Software Engineering Institute Carnegie Mellon University Pittsburgh</institution>
          ,
          <addr-line>PA</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-We describe our ongoing development of an insider threat indicator ontology. Our ontology is intended to serve as a standardized expression method for potential indicators of malicious insider activity, as well as a formalization of much of our  team's  research  on  insider  threat  detection,  prevention,  and  mitigation. This ontology bridges the gap between natural language descriptions of malicious insiders, malicious insider activity, and machine-generated data that analysts and investigators use to detect behavioral and technical observables of insider activity. The ontology provides a mechanism for sharing and testing indicators of insider threat across multiple participants without compromising organization-sensitive data, thereby enhancing the data fusion and information sharing capabilities of the insider threat detection domain.</p>
      </abstract>
      <kwd-group>
        <kwd>ontology</kwd>
        <kwd>insider threat</kwd>
        <kwd>data fusion</kwd>
        <kwd>information sharing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>I. BACKGROUND</p>
      <p>
        The study of insider threat presents some of the most
complex challenges in information security. Even defining the
insider threat has proven difficult, with interpretations and
scope varying depending on the problem space. The CERT®
Division of Carnegie  Mellon  University’s  Software 
Engineering Institute defines a malicious insider as a current or
former employee, contractor, or other business partner who has
or had authorized access to an organization’s network, system, 
or data and intentionally exceeded or misused that access in a
manner that negatively affected the confidentiality, integrity, or
availability  of  the  organization’s  information  or  information 
systems [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Organizations have begun to acknowledge the
importance of detecting and preventing insider threats, but
there is a surprising lack of standards within the insider threat
domain to assist in the development, description, testing, and
sharing of these techniques. For many organizations,
establishing an insider threat program and beginning to look
for potentially malicious insider activity is a new business
activity. In particular, Executive Order 13587 and the National
Insider Threat Policy describe minimum standards for
establishing an insider threat program and monitoring
employee use of classified networks for malicious activity
[
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
      <p>All entity and relationship data models, including semantic
data models, have their limitations [5]. Models are extremely
formal by design and can encounter problems when
representing the variety of actions involved in a real-world
insider threat case. In addition, the data on cases of insider
threat is often gathered from legal judgments and outcomes
whose documentation is highly variable. As a result, insider
threat domain experts tend to rely on natural language to
document their cases and findings. Though natural language is
more expressive than a model, we believe the insider threat
domain will benefit from the development of an ontology. Our
interest in building an ontology, developed from our
observations of the field today, is driven by the following
factors:</p>
      <p>
        We expect rapid growth in the data being collected and
shared by organizations, specifically about insider threats.
Some organizations have already stated that overcoming
this challenge is one of their top priorities [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        The insider threat research community lacks a defined,
formal model that is machine readable, human
understandable, and transferrable with limited sharing
barriers. We felt that starting a model of this kind, based
on the real-world case data we have already collected,
could accelerate this process within the community, as
has been done in other fields [
        <xref ref-type="bibr" rid="ref8">7, 8</xref>
        ].
      </p>
      <p>We are willing to accept some loss of descriptive power
for individual cases, provided we can analyze large
populations of cases using computation. We expect
insider threat teams (both in research and in operations) to
be asked to detect insider threat activity by analyzing a
growing quantity of data from new sources in an
increasingly limited amount of time.</p>
      <p>III. APPROACH</p>
    </sec>
    <sec id="sec-2">
      <title>A. Domain Identification</title>
      <p>At first glance, defining the domain of our ontology
appeared to be a trivial matter: representation of potential
indicators of malicious insider activity. In practice, indicators
of malicious insider activity involve complex interconnections
of parts of several other domains:</p>
      <p>Human behavior: understanding insider threats involves
understanding the people behind the malicious activity—
the reasons why they attacked, their psychological
characteristics, their emotions, and their intent.</p>
      <p>Social interactions and interpersonal relationships:
modeling the relationships between insiders and their
employers, colleagues, friends, and family is a crucial part
of identifying stressors that are often associated with
malicious insider activity.</p>
      <p>Organizations and organizational environments: the
culture and policies of organizations factor heavily into
the interpretation of malicious behavior within an
organization.</p>
      <p>Information technology security: information and
information systems can be both the targets of and tools
used to perpetrate malicious insider activity. IT security
also contains other concepts of interest in describing the
insider threat domain, namely, confidentiality, integrity,
and availability.</p>
    </sec>
    <sec id="sec-3">
      <title>B. Domain Scoping</title>
      <p>
        With a representative list of sub-domains for insider threat
enumerated, our next challenge was determining the scope at
which our ontology must provide support for each subdomain.
We chose to develop the following competency questions for
our ontology to assist us in our scoping efforts [
        <xref ref-type="bibr" rid="ref10">9, 10</xref>
        ].
      </p>
      <p>What concepts and relationships comprise the technical
and behavioral observables of potential indicators of
malicious insider activity?
What potential indicators of malicious insider threat
activity are insider threat teams using for detection?
To facilitate information sharing, at what level of detail
should organizations describe their indicators of
malicious insider activity without revealing
organizationsensitive information?</p>
    </sec>
    <sec id="sec-4">
      <title>C. Construction Method</title>
      <p>Since 2001, the CERT® Insider Threat Center has collected
over 800 cases in which insiders used IT to disrupt an
organization’s  critical  IT  services,  commit  fraud  against  an 
organization, steal intellectual property, or conduct national
security espionage, sabotaging systems and data, as well as
other cases of insiders using IT in a way that should have been
a concern to an organization. This data provides the
foundation for all of our insider threat research, our insider
threat lab, insider threat assessments, workshops, exercises,
and the models developed to describe how the crimes evolve
over time. Our case collection involves gathering and
analyzing data from public (e.g., media reports, court
documents, and other publications) and nonpublic (e.g., law
enforcement investigations, internal investigations from other
organizations, interviews with victim organizations, and
interviews with convicted insiders) sources. This data
collection, summarized in Figure 1, primarily focuses on
gathering information about three entities: the organizations
involved, the perpetrator of the malicious activity, and the
details of the incident. Each case in our insider incident
repository contains a natural language description of the
technical and behavioral observables of the incident. We used
these descriptions as the primary data source for our ontology.</p>
    </sec>
    <sec id="sec-5">
      <title>1) Data-Driven Ontology Bootstrapping</title>
      <p>
        To ensure full coverage of the information contained in our
insider incident repository, we adopted an approach that
utilizes concept maps as a first step in the development of an
ontology [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Manually developing concept maps for over 800
individual insider threat cases required an infeasible level of
effort, so we developed a semi-automated concept map
extraction method adapted from several existing approaches
[
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. This method used part-of-speech and part-of-sentence
tagging to extract [concept, concept, relationship] triples from
the natural language description of each insider incident. We
utilized additional text and natural language processing
techniques to eliminate stop-words, group similar triples, and
sort the triple collection by frequency of occurrence. We then
used this collection of triples as the basis for our class
hierarchy, using our competency questions to set scope and
optimize the arrangement of specific classes.
      </p>
    </sec>
    <sec id="sec-6">
      <title>2) Additional Data Sources</title>
      <p>
        We supplemented the candidate classes and object
properties derived from our insider incident repository with
concepts and relations from the cyber threat and digital
forensics domains. We reviewed the Structured Threat
Information Exchange (STIX) and Cyber Observable
Expression (CybOX) languages [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ], as well the SANS
Institute’s digital forensics artifact catalog [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], to fill gaps in
our concepts for cyber threats, cyber observables, and their
associated forensic artifacts.
      </p>
      <p>IV. IMPLEMENTATION</p>
      <sec id="sec-6-1">
        <title>A. Design Decisions</title>
        <p>
          We adapted components from several existing ontologies
for our work. To assist in the modeling of actors and their
actions, we adapted several top-level ontology components
from material available on schema.org [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. We leveraged
existing ontologies for filling gaps in our coverage of cyber
assets, including concepts from the network services, IT
systems, IT security, and mobile device domains [
          <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18-21</xref>
          ]. To
validate our design, we used the catalog of common ontology
development pitfalls from work  titled  “Validating  ontologies 
with  oops!”  [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. We provided support for modeling the
temporality of actions and events relative to one another
through use of the sequence design pattern [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. We have
chosen to implement our ontology using the Web Ontology
Language (OWL), due to its maturity, wide use, and
extensibility [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
        </p>
      </sec>
      <sec id="sec-6-2">
        <title>B. Overview of Top-Level Classes</title>
        <p>The top-level of our ontology, summarized in Figure 2, is
composed of five classes: Actor, Action, Asset, Event, and
Information. The Actor class contains subclasses for
representing people, organizations, and organizational
components such as departments. The Action class contains
the subclasses that define the things that actors can perform.
The Asset class provides subclasses that define the objects of
actions. The Information class provides subclasses that
provide support for modeling the information contained within
some assets (examples include personally identifiable
information, trade secrets, and classified information). The
Event class provides support for multiple types of events of
interest. Events are generally associated with one or more
Actions. The creation of an individual event typically requires
making some inference, as opposed to an individual Action,
which can be created through direct observation. For example,
moving a file is modeled in our ontology as an Action. A data
exfiltration event, when associated with a file move action via
the hasAction object property, expresses the fact that the
associated action was unauthorized. Additionally, an object
property hierarchy is provided to express various types of
relationship roles, job roles, and event roles.</p>
        <p>Asset
hasInformation</p>
        <p>Information
hasObject /
hasInstrument
hasOwnership</p>
        <p>Actor
hasActor
Event
hasAction</p>
        <p>Action
precedes</p>
      </sec>
      <sec id="sec-6-3">
        <title>C. Example Uses</title>
        <p>To demonstrate use of the ontology to describe indicators
of malicious insider activity, we present two examples of
translating natural language descriptions of indicators of
malicious insider activity from our insider threat incident
repository into ontology individuals. The translation process is
relatively straightforward; the concepts from each description
are manually identified, individuals are created for each
concept as instances of the appropriate ontology class, and
individual object properties are added to relate the class
instances to one another. Figure 3 and Figure 4, respectively,
depict the ontology translation for the following insider threat
indicator descriptions:</p>
        <p>The insider transferred proprietary engineering plans from
the victim organization's computer systems to his new
employer.</p>
        <p>The insider accessed a web server with an administrator
account and deleted approximately 1,000 files.
A. Insider Threat Indicator Information Sharing</p>
        <p>Our ontology provides two powerful concepts in the
description of potential indicators of malicious insider
activity: abstraction and extensibility. By abstraction, we
mean that indicators can now be described at a level of detail
that omits organization-sensitive information while still
maintaining enough descriptive information to express the
idea that given observable actions or conditions are potential
indicators of malicious insider activity. By extensibility, we
mean that we have provided the conceptual components that
organizations can use to describe their existing indicators and
develop new indicators. Potential indicators of malicious
insider  activity  often  include  qualifiers  such  as  “excessive ,” 
“anomalous,”  “unauthorized ,”  and  “suspicious”  to  distinguish 
conditions that are potentially indicative of malicious insider
activity from “normal”  behavior  and  activity.  D efinitions and
interpretations of these types of conceptual qualifiers vary
greatly from organization to organization, and often vary
within organizations based on variables such as job type,
location, and time. To accommodate these variations, we
introduce the idea of “policy packs” in o ur ontology: modular
collections of ontology axioms that represent
organizationagnostic concepts, definitions, and interpretations of indicator
patterns. Our ontology specifically provides support for this
via the Event class hierarchy. Organizations using our
ontology can develop their own defined classes, or modify
existing ones, to specify the necessary and sufficient
restrictions for class membership.</p>
        <p>B. Automated Indicator Instance Extraction Framework</p>
        <p>Insider threats can be detected by observing instances of
indicators of malicious insider activity within an organization.
Operationally, this involves the collection and analysis of
large amounts of data on every employee in an organization.
Without some level of automation, this detection practice
becomes infeasible to perform effectively and efficiently.
Using our ontology, we have designed a semi-automated
approach for the detection of potential indicators of malicious
insider activity that fuses data from multiple types of sources.
The ontology provides an analysis hub that combines
information from an organization’ s enterprise network activity
and human resources data to provide a data-rich environment
for the development and detection of robust, effective
indicators of malicious insider activity.</p>
        <p>1) Operational Data to Ontology Individuals</p>
        <p>We use the term “operational data” to encapsulate the data
and data sources that capture the user-based activity that
occurs  on  an  organization’s  info rmation systems and
networks. The technical observables associated with some
potential indicators of malicious insider activity are found in
operational data and during the analysis of trends in
operational data. Some examples of operational data include:
Host-based user activity logs
Critical application audit logs
Network activity logs
Communication server logs
System event logs</p>
        <p>Since operational data is usually found in structured or
semi-structured log files, we attempted to prove the concept of
automatically translating the information contained in
operational data sources into ontology individuals. Instead of
direct translation into ontology individuals from operational
data sources, we chose to translate the operational data into
CybOX cyber observable files, and automatically create
ontology individuals based on the contents of the CybOX
files. This approach allowed us to focus on identifying the
fields from CybOX that were applicable to our ontology
classes, and provide a translation mechanism for only those
applicable fields. Without the CybOX translation layer, we
would have had to develop ontology translation mechanisms
for each type of operational data source we wish to support,
which would require an infeasible level of effort, support, and
maintenance. Additionally, CybOX provides an API for their
XML file format, which facilitates the automated translation
of any input data source into the CybOX format. (CybOX
currently supports over 60 input data sources.)</p>
        <p>In our proof of concept, we were successful in
automatically translating Windows system event logs into the
CybOX format, and, using simple scripts, automatically
generating the OWL XML code to create individuals for a
small subset of our ontology classes. In a robust
implementation, the automated ontology individual creation
would provide configurable settings that would allow
organizations to control the creation of ontology individuals
for classes whose specific definitions may vary from
organization to organization. For example, if the ontology
contained a class representing after-hours logins, the
automated individual creation mechanism should provide a
way to specify a time range that is considered after-hours.
2) Human Resources Data to Ontology Individuals
We use the term “human resources data” to encapsulate
data and data sources that provide contextual and behavioral
information about employees. These records are typically
stored in an unstructured format, and are locked within Human
Resources departments to protect the privacy rights of
employees. Examples of human resources data include:
Organization charts
Employee performance reviews
Employee personnel files, including job title, supervisor,
role, and responsibilities
Employee behavior records, such as formal reprimands
and policy violations
Information from anonymous insider reporting channels
Results of background checks
Human resources data provides a rich source of contextual,
behavioral, and psychosocial information regarding
employees. Human resources data is typically more
fragmented and less structured than operational data, so the
automated translation of this data into ontology individuals
may be a challenge for some organizations. Enterprise
solutions for human resource information management exist,
and where they are used, a structured representation of human
resources data could be used to develop an automated
ontology translation process. In our proof of concept for the
automated indicator instance extraction framework, we did not
attempt to automatically create ontology individuals from
human resources data, but in future work, we will apply a
similar approach to we used for operational data.</p>
        <p>3) Semantic Reasoner</p>
        <p>If operational data and human resources data are both
described using the ontology, and if indicator policy packs are
in place, an organization can use a semantic reasoner to make
inferences and automatically classify ontology individuals as
instances of specific defined classes. Ontology individuals that
meet the formal definitions of potential indicators of malicious
insider  activity  can  then  be  said  to  have  “satisfied”  some 
indicator. A collection of ontology individuals that satisfy
threat indicators becomes a useful data set for insider threat
analysts. With a robust set of indicators implemented as
defined classes, analysts have the ability to see descriptions of
potential indicators of malicious insider activity across
previously disparate data sets and at larger scale. Satisfied
indicators can be reviewed by analysts to identify false
positives, refine indicators, develop new indicators to add
back into the ontology via policy packs, or create threat
reports that summarize the potential malicious insider activity
found in the data.</p>
        <p>4) Putting it All Together</p>
        <p>The full framework—beginning with the development and
maintenance of the ontology through the release of
organizational threat reports based on the detected instances of
potential indicators of malicious insider activity—is presented
in Figure 5. This framework is meant to support detection of
potential indicators of malicious insider activity that is then
triaged. An effective implementation of the framework
depends on the indicators it contains, and not all satisfied
indicators necessarily warrant an investigation.
The evaluation of specific instances of indicators requires
expert analysis and investigation to remove false positives,
assess severity of the satisfied indicator, and perform set and
temporal analysis on the satisfied indicators. The framework
can support a workflow-based analysis and incident escalation
process. Specific implementations of the framework are
expected to grow and change as the organization, its insider
threat program, and the larger insider threat community and
domain all do the same. The activities associated with the
operations and maintenance of this framework include
Identifying new candidate indicators during the analysis
of satisfied indicators
Adding new indicators to the ontology as updates or
additions to indicator policy packs
Re-running the semantic reasoner as new ontology
individuals are created and new indicators are added
Adding automated ingest support for new operational data
sources
Extending the human resources data ingest process to
include new data sources
Updating the configuration for the automated ontology
individual extractor as organizational policies change and
new insights are gained
In addition to the activities mentioned above, the ontology
itself will grow and change over time. The drivers for
ontology changes will be the addition of new concepts and
relationships based on analysis of new cases involving
malicious insider activity, as well as feedback from the
organizations that are using the ontology. Finally, indicator
policy packs can be safely shared with other organizations as a
means of identifying effective industry specific and
domainwide detection strategies and patterns.</p>
        <p>VI. CONCLUSION</p>
        <p>With the initial development of our ontology, we have
created a bridge between natural language descriptions of
potential indicators of malicious insider activity in case data
and the operational data that contains the technical and
behavioral observables associated with malicious insider
activity. We have provided a mechanism that allows sensitive
information to be abstracted away while maintaining enough
descriptive ability to effectively communicate actions and
behaviors of interest across organizations. By introducing the
application of our ontology as an analysis hub that combines
operational and human resources data, we have laid the
foundation for more effective fusion of these traditionally
disparate data sources.</p>
        <sec id="sec-6-3-1">
          <title>VII. FUTURE WORK</title>
          <p>As we continue the development of our ontology, we will
perform the following activities in future work:</p>
          <p>Provide enhanced support for behavioral components of
potential indicators of malicious insider activity
Collaborate with other organizations to improve the
expression of insider threat indicators using the ontology
Add support for additional indicator policy packs
Mature the proof of concept automated indicator instance
extractor and provide customization options for additional
data sources and organization configurations
Assess the feasibility of automating the creation of
ontology individuals based on human resources data
Evaluate formal ontology validation methods and apply
them to our ontology</p>
        </sec>
        <sec id="sec-6-3-2">
          <title>ACKNOWLEDGEMENT</title>
          <p>The authors gratefully acknowledge support for this work from
the Defense Advanced Research Projects Agency (DARPA) and the
Federal Bureau of Investigation. The views, opinions, and/or findings
contained in this article are those of the authors and should not be
interpreted as representing the official views or policies of the
Department of Defense or the U.S. Government. Approved for Public
Release, Distribution Unlimited.</p>
          <p>Copyright 2014 Carnegie Mellon University
This material is based upon work funded and supported by Federal Bureau of
Investigation under Contract No. FA8721-05-C-0003 with Carnegie Mellon
University for the operation of the Software Engineering Institute, a federally
funded research and development center sponsored by the United States
Department of Defense.</p>
          <p>References herein to any specific commercial product, process, or service by
trade name, trade mark, manufacturer, or otherwise, does not necessarily
constitute or imply its endorsement, recommendation, or favoring by Carnegie
Mellon University or its Software Engineering Institute.</p>
          <p>NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND
SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED
ON AN “AS -IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO 
WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS
TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY
OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY,
OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE
MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY
KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK,
OR COPYRIGHT INFRINGEMENT.</p>
          <p>This material has been approved for public release and unlimited distribution.
Carnegie Mellon® and CERT® are registered marks of Carnegie Mellon
University. DM-0001586</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Cappelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Moore</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R. F.</given-names>
            <surname>Trzeciak</surname>
          </string-name>
          , The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud):
          <source>Pearson Education</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>U.S. GOVERNMENT</surname>
          </string-name>
          ,
          <article-title>"Executive Order 13587-Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing</article-title>
          and Safeguarding of Classified Information,"
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B.</given-names>
            <surname>Obama</surname>
          </string-name>
          ,
          <article-title>"National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs,"</article-title>
          T. W. House, Ed., ed: Office of the Press Secretary,
          <year>2012</year>
          , p.
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F. o. A.</given-names>
            <surname>Scientists</surname>
          </string-name>
          ,
          <article-title>"National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs (Minimum Standards),"</article-title>
          T. W. Hourse, Ed., ed.
          <source>www.fas.org: Federation of American Scientists</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>West</surname>
          </string-name>
          ,
          <source>Developing high quality data models: Elsevier</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F.</given-names>
            <surname>Intelligence</surname>
          </string-name>
          and
          <article-title>National Security Alliance (INSA) in partnership with DHS, and</article-title>
          <string-name>
            <surname>ODNI</surname>
          </string-name>
          . (
          <year>2014</year>
          ).
          <article-title>Insider Threat Resource Directory</article-title>
          . Available: http://www.insaonline.org/insiderthreat M.
          <string-name>
            <surname>Ashburner</surname>
            ,
            <given-names>C. A.</given-names>
          </string-name>
          <string-name>
            <surname>Ball</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Blake</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Botstein</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Butler</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Cherry</surname>
          </string-name>
          , et al.,
          <article-title>"Gene Ontology: tool for the unification of biology," Nature genetics</article-title>
          , vol.
          <volume>25</volume>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>29</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Schulze-Kremer</surname>
          </string-name>
          ,
          <article-title>"Adding semantics to genome databases: towards an ontology for molecular biology,"</article-title>
          <source>in Ismb</source>
          ,
          <year>1997</year>
          , p.
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Grüninger</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Fox</surname>
          </string-name>
          ,
          <article-title>"The role of competency questions in enterprise engineering," in Benchmarking-Theory and</article-title>
          Practice, ed: Springer,
          <year>1995</year>
          , pp.
          <fpage>22</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gangemi</surname>
          </string-name>
          ,
          <article-title>"Ontology design patterns for semantic web content," in The Semantic Web-ISWC</article-title>
          <year>2005</year>
          , ed: Springer,
          <year>2005</year>
          , pp.
          <fpage>262</fpage>
          -
          <lpage>276</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Starr</surname>
          </string-name>
          and
          <string-name>
            <surname>J. M. P. de Oliveira</surname>
          </string-name>
          ,
          <article-title>"Conceptual maps as the first step in an ontology construction method,"</article-title>
          <source>in Enterprise Distributed Object Computing Conference Workshops (EDOCW)</source>
          ,
          <year>2010</year>
          14th IEEE International,
          <year>2010</year>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>K.</surname>
          </string-name>
           Žubrinic, 
          <article-title>"Automaticc r eation of a concept map."</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Villalon</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Calvo</surname>
          </string-name>
          ,
          <article-title>"Concept Map Mining: A definition and a framework for its evaluation,"</article-title>
          <source>in Web Intelligence and Intelligent Agent Technology</source>
          ,
          <year>2008</year>
          . WI-IAT'
          <fpage>08</fpage>
          . IEEE/WIC/ACM International Conference on,
          <year>2008</year>
          , pp.
          <fpage>357</fpage>
          -
          <lpage>360</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Barnum</surname>
          </string-name>
          ,
          <article-title>"Standardizing cyber threat intelligence information with the Structured  Threat  Information  eXpression  (STIX™),"</article-title>
            MITRE Corporation,
          <year>July</year>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>The</surname>
            <given-names>MITRE Corporation.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Cyber Observable eXpression</article-title>
          . Available: http://cybox.mitre.org/language/version2.1/
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>"SANS Digital Forensics and Incident Response Poster Released," in Blog: SANS Digital Forensics</article-title>
          and Incident Response Blog vol.
          <year>2014</year>
          , S. D. Faculty, Ed., ed.
          <source>SANS: SANS</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>[17] schema.org. Available: http://schema.org</mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>J</surname>
          </string-name>
          .
          <article-title>-b.</article-title>
          <string-name>
            <surname>Gao</surname>
          </string-name>
          , B.-w. Zhang, X.
          <article-title>-h.</article-title>
          <string-name>
            <surname>Chen</surname>
            , and
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Luo</surname>
          </string-name>
          ,
          <article-title>"Ontology-based model of network and computer attacks for security assessment,"</article-title>
          <source>Journal of Shanghai Jiaotong University (Science)</source>
          , vol.
          <volume>18</volume>
          , pp.
          <fpage>554</fpage>
          -
          <lpage>562</lpage>
          ,
          <year>2013</year>
          /10/01 2013.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Fenz</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Ekelhart</surname>
          </string-name>
          ,
          <article-title>"Formalizing information security knowledge,"</article-title>
          <source>in Proceedings of the 4th international Symposium on information, Computer</source>
          , and Communications Security,
          <year>2009</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>L.</given-names>
            <surname>Obrst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Chase</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Markeloff</surname>
          </string-name>
          ,
          <article-title>"Developing an ontology of the cyber security domain,"</article-title>
          <source>Proceedings of Semantic Technologies for Intelligence</source>
          , Defense, and
          <string-name>
            <surname>Security</surname>
          </string-name>
          (STIDS), pp.
          <fpage>49</fpage>
          -
          <lpage>56</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Parkin</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. van Moorsel</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>R.</given-names>
            <surname>Coles</surname>
          </string-name>
          ,
          <article-title>"An information security ontology incorporating human-behavioural implications,"</article-title>
          <source>in Proceedings of the 2nd International Conference on Security of Information and Networks</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Poveda-Villalón</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Suárez-Figueroa</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gómez-Pérez</surname>
          </string-name>
          ,
          <article-title>"Validating ontologies with oops!," in Knowledge Engineering and Knowledge Management</article-title>
          , ed: Springer,
          <year>2012</year>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>281</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Aldo</surname>
            <given-names>Gangemi.</given-names>
          </string-name>
          (
          <year>2010</year>
          ). Submissions:Sequence. Available: http://ontologydesignpatterns.org/wiki/Submissions:Sequence
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>G.</given-names>
            <surname>Antoniou</surname>
          </string-name>
          and
          <string-name>
            <surname>F. Van Harmelen</surname>
          </string-name>
          ,
          <article-title>"Web ontology language: Owl," in Handbook on ontologies</article-title>
          , ed: Springer,
          <year>2004</year>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>92</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>