<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Building an Ontology of Cyber Security</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alessandro Oltramari</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lorrie Faith Cranor</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CyLab, Carnegie Mellon University Pittsburgh</institution>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science Pennsylvania State University University Park</institution>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <fpage>54</fpage>
      <lpage>61</lpage>
      <abstract>
        <p>-Situation awareness depends on a reliable perception of the environment and comprehension of its semantic structures. In this respect, cyberspace presents a unique challenge to the situation awareness of users and analysts, since it is a unique combination of human and machine elements, whose complex interactions occur in a global communication network. Accordingly, we outline the underpinnings of an ontology of secure operations in cyberspace, presenting the ontology framework and providing two modeling examples. We make the case for adopting a rigorous semantic model of cyber security to overcome the current limits of the state of the art.</p>
      </abstract>
      <kwd-group>
        <kwd>ontology patterns</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        As disclosed by a recent report1, there has been half a
billion cyber security breaches in the first semester of 2014,
matching the record set across the entire precedent year. In
general, this alarming trend should not surprise when we
consider that the bedrock of the Internet is a technological
infrastructure built almost 35 years ago for trusted military
communications and not for data exchange in the wild (see [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
p.58). The picture gets even worse when considering that the
ability to grasp the risk and threats associated with computer
networks is averagely poor: recent surveys have actually
shown that 65% of the victims of intrusion and information
theft in the private sector are notified by third parties and that
the detection process usually takes up to 13 months (e.g., see
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], p.10).
      </p>
      <p>
        Though not exhaustive, such rough statistics at least
suggest that if the inadequacy of the technological infrastucture
is a key aspect to explain the vulnerabilities of networked
computer systems, the human factor also plays a central role.
As proposed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], to improve situation awareness of users and
security operators, a shift of focus from system to environment
level is highly necessary when modeling cyber scenarios: to
this end, a full-fledged science of cyber security needs to be
founded, whose core tenet is cognizing the cyberspace as a
hybrid framework of interaction between humans and
computers, where security and privacy policies play a crucial
role. As stated by [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], this cognizance depends on both a
reliable perception of the elements of the environment and,
most importantly for our work, on the explicit representation of
their semantics. Accordingly, the current article presents the
underpinnings of an ontology of secure cyber operations: by
      </p>
    </sec>
    <sec id="sec-2">
      <title>1 https://www.riskbasedsecurity.com/reports/2014</title>
      <p>MidYearDataBreachQuickView.pdf</p>
      <p>
        Every science is concerned with distinct objects and strives
to build rigorous models of the phenomena involving them
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]: accordingly, the objects of a science of cyber security
correspond to the attributes of (and the relations between)
network of computer devices, security policies, and the tools
and techniques of cyber attack and cyber defense [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Therefore, inasmuch as ontologies are formal models of a
domain, building ontologies of the aforementioned attributes
and relations is critical for the transformation of cyber security
into a science.
      </p>
      <p>
        In 2010, the DoD sponsored a study to examine the theory
and practice of cyber security, and evaluate whether there are
underlying fundamental principles that would make it possible
to adopt a more scientific approach. The study team concluded
that the most important requirement would be “the
construction of a common language and a set of basic
concepts about which the security community can develop a
shared understanding. A common language and agreed-upon
experimental protocols will facilitate the testing of hypotheses
and validation of concepts” [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The need for controlled
vocabularies and ontologies to make progress toward a science
of cyber security is recognized in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] as well. In this
domain, ontologies would include the classification of cyber
attacks, cyber incidents, and malicious and impacted software
2 For instance, exploiting material available in this portal:
http://militaryontology.com/cyber-security-ontology.html
3 http://cra.psu.edu/
programs. From our point of view, where the human
component of cyber security is also essential, the analysis
needs to be expanded to the different roles that attackers,
users, defenders and policies play in the context of cyber
security, the different tasks that the members of a team are
assigned to by the team leader, and the knowledge, skills and
abilities needed to fulfill them.
      </p>
      <p>
        There has been little work on ontologies for cyber security
and cyber warfare. Within a broader paper, there is a brief
discussion of an ontology for DDoS attacks [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and a general
ontology for cyber warfare is discussed in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. To the best of
our knowledge, Obrst and colleagues [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] provide the most
comprehensive description of a cyber ontology architecture,
whose vision has actually inspired the work presented in this
paper (the scale of the project and its difficulties are also
discussed by Dipert in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]). By and large, efforts that have
been made toward developing ontologies of cyber security,
even when expressed in OWL, RDF or other XML-based
formats, typically do not utilize existing military domain or
middle-level ontologies such UCORE-SL4. With regard to
human users and human computer interaction, the most
important step in understanding a complex new domain
involves producing accessible terminological definitions and
classifications of entities and phenomena, as stressed in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
Discussions of cyber warfare and cyber security often begin
with the difficulties created by misused terminology (such as
characterizing cyber espionage as an attack): in this regard, the
Joint Chiefs of Staff created a list of cyber term definitions that
has been further developed and improved in a classified
version5. None of these definitions, however, are structured as
an ontology. Likewise, various agencies and corporations
(NIST6, MITRE7, Verizon8) have formulated enumerations of
types of malware, vulnerabilities, and exploitations. In
particular MITRE, which has been very active in this field,
maintains two dictionaries, namely CVE (Common
Vulnerabilities and Exposures 9 ) and CWE (Common
Weakness Enumeration10), a classification of attack patterns
(CAPEC - Common Attack Pattern Enumeration and
Classification11), and an XML-structured language to represent
cyber threat information (STIX - Structure Threat Information
Expression 12 ). Regardless of the essential value of these
resources, without a “shared semantics” the sprawling
definitions they contain are hard to maintain and port into
machine-readable formats.
      </p>
      <p>III. A THREE-LEVEL ONTOLOGY FOR</p>
      <p>THE CYBER-SECURITY RESEARCH ALLIANCE</p>
      <p>Top-level ontologies capture generic characteristics of
world entities, such as spatial and temporal dimensions,
morphology (e.g., parts, edges, sides), qualities (e.g., color,
4
http://www.slideshare.net/BarrySmith3/universal-core-semantic-layerucoresl
5 http://publicintelligence.net/dod-joint-cyber-terms/
6 http://www.nist.gov/
7 http://www.mitre.org/
8 http://www.verizon.com/
9 https://cve.mitre.org/
10 http://cwe.mitre.org/
11 https://capec.mitre.org/
12 https://stix.mitre.org/language/version1.1.1/
volume, electric charge), etc.; because of their inherent
generality, they are not suited to model contextual aspects.
Nevertheless, it’s good practice to describe the fine-grained
concepts that constitute a domain-level ontology in terms of
foundational (or top-level) categories, adding core (or
middlelevel) notions to fill contingent conceptual gaps. For instance,
an ontology of mineralogy should include notions like “basaltic
rock”, “texture” and “metamorphic reaction”. In order to
describe the meaning of those specific concepts, high-level
categories such that “object”, “quality” and “process” must be
employed; the ontology should also define an intermediate
notion like “metamorphism”, which is common across domains
(biology, chemistry, computer science, architecture, etc.), to
explain how the different phases, end products, and features of
metamorphic reactions are bound together.</p>
      <p>
        Our ontology of cyber security makes no exceptions to the
tripartite layering described above: in particular, CRATELO is
an ontological framework constituted of a domain ontology of
cyber operations (OSCO), designed on the basis of DOLCE top
ontology extended with a security-related middle-level
ontology (SECCO). The three levels of CRATELO
(schematized in figure 1) currently include 223 classes and 131
relationships (divided into 116 object properties and 15
datatype properties) and encoded in OWL-DL. The
expressivity of the ontology is SRIQ, a decidable extension of
the description logic SHIN (see [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] for more details).
A. Descriptive Ontology for Linguistic and Cognitive
Engineering (DOLCE)
      </p>
      <p>
        DOLCE is part of a library of foundational ontologies for
the Semantic Web developed under the WonderWeb EU
project 13 . As reflected in the acronym, DOLCE holds a
cognitive bias, i.e., aiming at capturing the conceptual
primitives underlying natural language and commonsense
reasoning [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. In order to reduce the complexity of the
axiomatisation, in the current work we adopt
DOLCESPRAY14, a simplified version of DOLCE [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>The root of the hierarchy of DOLCE-SPRAY is ENTITY,
which is defined as the class of anything that is identifiable as
an object of experience or thought. The first relevant
distinction is among CONCRETE ENTITY, i.e., whose instances
13 http://wonderweb.man.ac.uk/
14 Categories are indicated in small caps; relationships in italics.
Mutiple individuals instantiating the same category are denoted by
adding an ‘s’ to the category name (e.g., REQUIREMENTs).
Presenting the axiomatisation of DOLCE-SPRAY is out of scope in
this paper.</p>
      <p>CONCRETE ENTITY</p>
      <p>CONTINUANT</p>
      <p>AGENT</p>
      <p>PERSON
GROUP</p>
      <p>SOCIAL GROUP
OBJECT</p>
      <p>ARTIFACT</p>
      <p>NATURAL ENTITY
SUBSTANCE</p>
      <p>TEMPORAL LOCATION
SPATIAL LOCATION</p>
      <p>COMPOSITE QUALITY
ABSTRACT ENTITY</p>
      <p>PHYSICAL QUALITY
OCCURRENT</p>
      <p>PROCESS
ACTION</p>
      <p>STATE
ABSTRACT QUALITY
INFORMATION
CHARACTERIZATION</p>
      <p>ROLE
PLAN</p>
      <p>POLICY
TASK</p>
      <p>
        REQUIREMENT
are located in definite spatiotemporal regions, and ABSTRACT
ENTITY, whose instances don’t have inherent spatiotemporal
dimensions. CONCRETE ENTITY is further divided into
CONTINUANT, OCCURRENT, and QUALITY, respectively entities
with inherent spatial parts (e.g., artifacts, animals, substances),
entities with inherent temporal parts (e.g., events, actions,
states) and entities whose existence depends on their host (for
instance ‘the color of a flower’, ‘the duration of a football
game’, ‘the area of a construction site’, etc.). DOLCE’s basic
ontological distinctions are maintained in DOLCE-SPRAY:
the substantial differences come from a) merging ABSTRACT
and NON–PHYSICAL–ENDURANT categories into
DOLCESPRAY’s ABSTRACT ENTITY and b) by breaking the class
QUALITY into PHYSICAL QUALITY and ABSTRACT QUALITY,
moving the latter under the branch ABSTRACT ENTITY.
Accordingly, the class ABSTRACT QUALITY designates the
qualities that don’t have any defining spatiotemporal
dimension, such as the price of goods, the usefulness of a
service, etc. A sibling of ABSTRACT QUALITY under the
ABSTRACT ENTITY branch, INFORMATION refers to any content
that can be conveyed by some physical OBJECT, from the
metal boards used for road signs to the memory location of a
Python script. CHARACTERIZATION is defined as a mapping of
n-uples of individuals to truth-values. Individuals belonging to
CHARACTERIZATION can be regarded to as ‘reified concepts’
(e.g., ‘manufactured object’), and the irreflexive,
antisymmetric relation characterizes associates them with the
objects they denote (‘a collection of vintage shoes’). Among
the relevant sub-types of CHARACTERIZATION we can find:
ROLE, i.e., the classification of an entity according to a given
context or perspective (e.g., ‘instructor’); PLAN, namely the
generic description of an action (such as ‘the disassembly of a
9mm’); TASK, that is a representation of the specific steps that
are needed to execute an ACTION according to a PLAN (e.g.,
‘removing the magazine’, ‘pull back the slide’);
REQUIREMENT, whose instances can be seen as the conditions
that need to be satisfied as part of a PLAN (e.g., ‘the weapon
must be clear before proceeding’). A specific sub-class of
PLAN is POLICY, whose instances need to satisfy specific
REQUIREMENTs adopted or proposed by some SOCIAL GROUP
(e.g., a government, a party, a no profit association, a private
company, etc.). In general, the branch of DOLCE-SPRAY
rooted on CHARACTERIZATION distills the extensions
introduced in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. An overview of DOLCE-SPRAY backbone
taxonomy is represented in Figure 2.
      </p>
      <p>B. Security Core Ontology (SECCO)</p>
      <p>This section outlines a set of security concepts based on
DOLCE-SPRAY primitives.</p>
      <p>An entity is a THREAT φ for an ASSET α valued by a
STAKEHOLDER σ and protected by a DEFENDER δ, if and only
if φ is used by an ATTACKER κ to exploit a VULNERABILITY ϖ
of α in an OFFENSIVE_OPERATION το. To prevent το, a
specific collection of SECURITY_REQUIREMENTs υs need to be
satisfied by a SECURITY_POLICY π, enforced to protect α. But if
το strikes, δ has to promptly defend α, performing a suitable
DEFENSIVE_OPERATION δο to deploy a COUNTERMEASURE χ
for neutralizing PAYLOAD ψ conveyed by το15. The class
OPERATION can be represented as the union of το and δο: any
OPERATION ο is carried out on the basis of a MISSION-PLAN λ
whose sequence of MISSION_TASKs ξs are executed in ο16.
Note that in order to delineate λ in a DEFENSIVE_OPERATION
δο, δ would also need to run a RISK-ASSESSMENT µ of the RISK
ρ associated to ξs (datatype properties can be used to
represent ρ as a parameterization of the expected losses,
probabilities of attack, etc.)17. The formalization below (1-30)
represents a basic alignment between SECCO and
DOLCESPRAY. The relations isPartOf, participates (and its inverse
hasParticipant), isQualityOf, characterizes, definedIn,
satisfies hasRole, hasRequirement, are imported from
DOLCE-SPRAY. We used self-explanatory abbreviations
(e.g., OFF_OP instead of OFFENSIVE_OPERATION) to keep the list
compact, when possible. For reasons of space, presenting a
comprehensive set of axioms for SECCO is out of scope in
this paper.</p>
      <p>
        ATTACKER18!! ⊑ ROLE! ∀ !ℎ!"!#$%"&amp;'%(. AGENT
DEFENDER!! ⊑ ROLE! ∀ !ℎ!"!#$%"&amp;'%(. AGENT
(1)
(2)
15 Both countermeasures and payloads are artifacts of some sort, e.g., an
antidote and a poison.
16 ο can be a single ACTION or a complex collection of interconnected actions.
17 Although risk assessment needs to be done preemptively, continuous
monitoring is also required for up-to-date situational awareness.
18 In our model, instances of ATTACKER, DEFENDER and STAKEHOLDER
are not equal to instances of PERSON,2GROUP2 and, in general, AGENT.2In2this2
perspective,2 ‘Alessandro’2 (instance2 of2 PERSON)2 qua 2 DEFENDER2 would2
correspond2 to2 team2 member2 ‘Alpha1’2 (instance2 of2 DEFENDER).2 Qua N
entities2 have2 been2 formally2 analyzed2 in2 [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].2 Also,2 since2 in2 different2
situations2 a2 defender2 may2 play2 the2 role2 of2 an2 attacker2 (and2 vice2 versa),2
we2don’t2consider2the2two2classes2as2disjoint.2
(3)
(4)
STAKEHOLDER!! ⊑ ROLE! ∀ !ℎ!"!#$%"&amp;'%(. AGENT
      </p>
      <p>
        SECCO’s categories are positioned at a too coarse-level of
granularity to capture the details of domain-specific scenarios:
properties like THREAT, VULNERABILITY, ATTACK,
COUNTERMEASURE, ASSET are orthogonal to different domains
and, in virtue of this, they can be predicated of a broad
spectrum of things: for instance, infections are a threat to the
human body, Stuxnet is a threat to PLCs, the impact of large
asteroids on the Earth’s surface is a threat to the survival of
organic life forms, dictatorship is a threat to civil liberties, and
so on and so forth. Though there seems to be a consensus in
the literature on the core ontological concepts of security (see
[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]), the minimal set presented here has been
occasionally expanded along alternate directions. For instance,
Fenz and Ekelhart [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] introduce the concept of ‘control’, by
means of which stakeholders implement suitable
countermeasures to mitigate known vulnerabilities of assets20.
A ‘policy’, in this context, is defined as a regulatory or
organizational form of control (SECCO definition of POLICY is
more functionality-centered). Fenz and Ekelhart [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] also
outline a taxonomy of assets, distinguishing ‘tangible’ (e.g.,
19 Note that δ and σ may or may not coincide: in the second case, the latter
needs to delegate the former to act in her behalf. The notion of delegation
(and trust) in agent ontologies has been extensively studied by [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], but it’s
currently not included in CRATELO, as (6) shows.
20 In cyber security, exploitations of unknown vulnerabilities correspond to
the so-called Zero-Day Attacks.
‘wallet’) from ‘intangible’ ones (e.g., ‘credit card
credentials’), where the former can be furthermore split into
‘movable’ (e.g., ‘car’, ‘jewelry’) and ‘unmovable’ (e.g.,
‘house’, ‘land’). Interestingly enough, Fenz and Ekelhart reify
the procedure of assessing a risk into the concept of ‘rating’,
whose attributes can be expressed qualitatively (e.g., in Likert
scale – high, medium and low) or quantitatively (measuring
the probability of a risk). Avižienis and colleagues present a
comprehensive analysis of security where the notion of ‘fault’
is introduced to denote an interruption of the services
delivered by a given system in the environment [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. A
middle-level ontology of security can be possibly extended
beyond SECCO: in this respect, the key contribution of this
module doesn’t rely on the coverage (or ‘concept density’ –
see [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], p. 187) of security primitives but on the
formalization driven by a top-level ontology. Our approach
has some similarities with the effort described in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], though
Massacci and colleagues were principally concerned with the
ontological analysis of a specific software development
methodology, Secure Tropos.
      </p>
      <p>C. Ontologies of Secure Cyber Operations (OSCO)</p>
      <p>
        One of the major cyber security problems for government
and corporations is the widespread “operational chaos”
experienced by analysts, as Michael Susong has recently
called the phenomenon of “having too many alarms (false
positives) in a network, not enough trained people to deal with
them, and a consequent poor prioritization of risks and
countermeasures” 21 . In this regard, the objective of an
ontology of cyber security is to shape that chaos into a
framework of meaningful and reusable chunks of knowledge,
turning the operational disarray into a systematic model by
means of which cyber analysts can improve their situation
awareness. As mentioned in section 1, the key to this
augmented cognizance relies on a consistent assessment of the
context and on a comprehensive understanding of its elements
at the semantic level. But how is a cyber operation usually
defined? In a document released in 2010, the Joint Chiefs of
Staff describes a “cyberspace operation” as the “employment
of cyber capabilities where the primary purpose is to achieve
objectives in or through cyberspace. Such operations include
computer network operations and activities to operate and
defend the Global Information Grid” [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Drawing on this
broad definition and relying on DOLCE-SPRAY and SECCO,
in OSCO we represent a CYBER_OPERATION ψ as an
OPERATION executed by a CYBER_OPERATOR ϕ , who can play
either the role of DEFENDER in a
DEFENSIVE_CYBEROPERATION or the role of ATTACKER in an
OFFENSIVE_CYBEROPERATION. In the context of cyber security we can also
distinguish between those OFFENSIVE_CYBER_OPERATIONs
whose MISSION-PLANs satisfy the OFFENSIVE_REQUIREMENT of
remaining undetected, and those that don’t: we use the class
CYBER_EXPLOITATION to the denote the former, and
CYBERATTACK for the latter. As Lin points out in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], from a
technical viewpoint cyber-attacks and cyber exploitations are
very similar: they use the same access paths and focus on the
same vulnerabilities. The difference is on the delivery and
21 Dr. Micheal Susong is an Intelligence Subject Matter Expert affliated to
iSIGHT Partners; he gave an invited talk at Carnegie Mellon University on
September 8th, 2014.
execution of the PAYLOAD that must be performed
undetectably in CYBER_EXPLOITATIONs (e.g., port scanning or
SQL injections). The list of class-inclusions below (33-51)
denotes the alignment between OSCO and SECCO categories
and some specializations of OSCO domain concepts. For
reasons of space we could not include a formal
characterization of specific cyber threats and cyber
vulnerabilities (comprehensive classifications can be
consistently found in military reports, doctrines and academic
articles - see [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]).
(31)
(32)
Since the development of a full-scale domain ontology is
currently underway within our project, for the sake of this
article we will limit ourselves to model only two sample
scenarios.
      </p>
      <p>1) Example 1:RETRIEVE_FILE_SECURELY</p>
      <p>Figure 3 represents CRATELO’s classes and relationships
used to model the Retrieve File Securely scenario. For issues of
visualization, the diagram covers only the most salient notions
involved in this cyber operation. In order to retrieve a file
without exposing a computer system – and possibly an entire
network – to cyber threats, some specific security requirements
need to be fulfilled while carrying out that operation. In
particular, as it is also the case for other kinds of
CYBEROPERATION, RETRIEVE-FILE-SECURELY must occur over a secure
channel of a network, from authenticated computer(s) and
through authorized server(s). By and large, abiding to these
security requirements while executing the mission-tasks
should lead to mission accomplishment. The composite</p>
      <p>
        RETRIEVE-FILE-SECURELY-TASK can be further divided into
simpler temporally-structured and logically-connected
subtasks. Accordingly, a request for a file can be sent to an
authenticated server only after locating the desired file in the
network; the inspection of the file can trivially occur only once
the file has been obtained; and so on and so forth. In
CRATELO we can express these basic temporal constraints by
means of the foundational layer: in fact, DOLCE includes an
adaptation of Allen’s axioms [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], which are considered as a
powerful logical theory for temporal representation and
reasoning (the formalization of these axioms has also been
maintained in DOLCE-SPRAY). Moreover, if malware is
detected, the file must be removed from the host: the
deployment of this preventive countermeasure aims at avoiding
a disruption of the isolated computer node and a cyber attack to
the network it belongs to. This countermeasure can be
expressed as a conditional rule formalized in CRATELO by
using an additional modeling apparatus, i.e., the Semantic Web
Rule Language (SWRL)22, which extends OWL-DL axioms.
By including rule-based mechanisms in CRATELO we also
comply with the core requisites described in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] of a
fullfledged cyber ontology architecture.
      </p>
      <p>
        As the example exposes, one of the key design principles
underlying CRATELO is to separate the temporal dynamics of
cyber operations from the abstract generalizations used to
describe them, i.e., plans, tasks, requirements. This approach
consents to model a cyber operation as an ontology pattern
grounded on the top level dyad ACTION-CHARACTERIZATION,
unfolded by the middle-level tetrad
OPERATIONMISSION_PLAN-MISSION_TASK-SEC_REQUIREMENT, and
specified by
CYBER_OPERATION-CYBER_MISSION_PLANCYBER_MISSION_TASK-CYBER_SECURITY_REQUIREMENT. In
recent years, ‘ontology patterns’ have become an important
instrument for conceptual modeling [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]: the rationale, as our
work suggests, is to identify some minimal knowledge
structures within an ontology to be used for modeling a
problem (in this regard, the ontology remains the reference
framework whereby the pattern can be expanded). This
methodology is also ideal from a reasoning standpoint. For
instance, in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] the authors state that “mission activities are
tasks focused on answering mission questions” (where the
latter can be seen as partially overlapping the notion of
security requirement): but an ontology that fails to
discriminate ‘activities’ from ‘tasks’ would likely be affected
in its inference capabilities, in the degree that reasoning over
tasks that have not been executed yet – i.e., that are not
activities – would not be supported. It’s not difficult to
imagine the circumstances where this limit can become a
serious drawback for a cyber analyst: mental simulation is
commonly adopted by humans to foresee the outcomes of an
action before performing it [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ], and a semantic framework
where mission activities and tasks are conceptually viewed as
the same entity precludes that, and might eventually result into
pervasive logical inconsistencies (if the ambiguity is not
somehow reduced). On the contrary, an ontology-pattern
based on CRATELO allows to specify cyber operations at a
sufficient level of conceptual granularity.
22 http://www.w3.org/Submission/SWRL/
      </p>
      <p>
        In a simplified scenario where an SQL injection attack is
launched, a defensive cyber operation of
INTRUSION_DETECTION can be divided into three essential
subactions (and corresponding tasks): 1) block the IP address of
the attacker; 2) to escalate the level of response; 3) to block all
external connections and 4) redirect the incoming traffic to a
honeypot for further inspection. Who can perform these
actions? In the real world, cyber analysts with different
responsibilities and privileges usually form a response team:
for instance, we can indicate with L1, L2 and L3 the
incremental levels of expertise of cyber analysts. Accordingly,
1) would only be performed by L1 analysts; 2) can only be
performed by L1 analysts toward L2 analysts or by L2 toward
L3; 3) can only be executed by L2 analysts and 4) only by L3.
As a matter of fact, gauging which action fits better the
situation is not a one-shot decision, but rather a multi-stage
evaluation process where the situational awareness of cyber
analysts frequently changes Also, each of those sub-actions
has incremental costs and inversely proportional risks: for
instance, if blocking all the connections to a web server
eliminates the risks of a reiterated attack, suspending the
network traffic has a severe impact on the system functionality
(e.g., no data access for authorized third parties): escalation, in
this context, is an effective means to prevent risk
mismanagement. Although this simplified scenario gives only
a partial account of the actions that actual analysts have at
their disposal, using an ontology of cyber security like
CRATELO to model intrusion detection can clearly represent
a mean to improve situational awareness and fill the semantic
gap [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] in our understanding of the cognitive demands in the
cyber world. Figure 4 presents a partial view of CRATELO
categories and relations used for intrusion detection.
      </p>
      <sec id="sec-2-1">
        <title>IV. CONCLUSIONS AND FUTURE WORK</title>
        <p>
          Notwithstanding the proliferation of taxonomies,
dictionaries, glossaries, and terminologies of the cyber
landscape, building a comprehensive model of this domain
remains a major objective for the community of reference, that
includes government agencies, private organizations,
researchers and intelligence professionals. There are multiple
reasons behind the discrepancy between demand and supply of
semantic models of cyber security. Although we cannot
thoroughly address this topic here, we are firmly convinced
that a great part of the problem is the lack of balance between
the ‘vertical’ and the ‘horizontal’ directions of the effort. From
one side, state of the art consists of several classifications of
the domain, as argued in Section II: these efforts typically yield
rich catalogs of cyber attacks, exploits and vulnerabilities. On
the other side, a rigorous conceptual analysis of the entities and
relationships that are encompassed by different cyber scenarios
would also be needed, but little work has been done on this
horizontal dimension (if we exclude the ongoing MITRE
initiative described by Leo Obrst and colleagues in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]). In
this paper we placed ourselves on the second perspective:
instead of presenting “yet another” catalog of cyber notions, an
endeavor that remains however of undisputable relevance, we
decided to explore in depth the semantic space of operations.
Our investigation addresses cyber operations as complex
entities where the human factor is as important as the
technological spectrum: our ontological analysis is grounded
on a bedrock of foundational concepts and reaches the domain
of cyber operations through an intermediate layer where core
notions are defined.
        </p>
        <p>
          Future work will focus on the following research steps:
• extending SECCO with an ontology of risk;
• populating OSCO with a large set of cyber
operations documented in the literature and
learned from real-world case studies;
• designing and customizing a methodology for
ontology validation based on “competency
questions” submitted to domain experts (along to
what has been proposed in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]);
• running cyber warfare simulations within military
exercises, collecting data to be modeled with
        </p>
        <p>CRATELO;
• studying ontology mappings beteween CRATELO
and other semantic models (e.g., MITRE’s Cyber
Ontology Architecture), ensuring interoperability
and reusability of the resource.</p>
        <p>We are aware of the challenges ahead of us in pursuing this
research agenda, which would usually be very difficult to
implement. Nevertheless, we’re also persuaded that, in the
broad vision framed by the ARL Cyber Security Collaborative
Research Alliance, what we have described illustrates a
realistic work plan and a necessary step toward the foundation
of a science of cyber security.</p>
      </sec>
      <sec id="sec-2-2">
        <title>ACKNOWLEDGMENTS</title>
        <p>This research was sponsored by the Army Research Laboratory
and was accomplished under Cooperative Agreement Number
W911NF-13-2-0045 (ARL Cyber Security CRA). The views
and conclusions contained in this document are those of the
authors and should not be interpreted as representing the
official policies, either expressed or implied, of the Army
Research Laboratory or the U.S. Government. The U.S.
Government is authorized to reproduce and distribute reprints
for Government purposes notwithstanding any copyright
notation here on.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Yannakogeorgos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Lowther</surname>
            ,
            <given-names>A. B. "</given-names>
          </string-name>
          <article-title>The Prospects of Cyber Deterrence: American Sponsorships of Global Norms," in Conflict and</article-title>
          Cooperation in Cyberspace.: Taylor&amp;Francis,
          <year>2013</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L.</given-names>
            <surname>Mattice</surname>
          </string-name>
          ,
          <article-title>"Taming the "21st Century's Wild West" of Cyberspace?," in Conflict and</article-title>
          Cooperation in Cyberspace.: Taylor&amp;Francis,
          <year>2013</year>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>McDaniel</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivera</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Swami</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          "
          <article-title>Toward a Science of Secure Environments,"</article-title>
          <source>Security and Privacy</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>68</fpage>
          -
          <lpage>70</lpage>
          , July/
          <year>August 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Endsley</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          <article-title>"Toward a Theory of Situation Awareness in Dynamic Systems,"</article-title>
          <source>Human Factors</source>
          , vol.
          <volume>37</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>64</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <article-title>"Escalation Dynamics and Conflict Termination in Cyberspace,"</article-title>
          <source>Strategic Studies Quarterly</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>70</lpage>
          ,
          <year>Fall 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Bunge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Causality</surname>
            and
            <given-names>Modern</given-names>
          </string-name>
          <string-name>
            <surname>Science</surname>
          </string-name>
          . New York: Dover Publications,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Kott</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>"Towards Fundamental Science of Cyber Security," in Network Science and Cybersecurity</article-title>
          , R. E. Pino, Ed. New York,
          <year>2014</year>
          , vol.
          <volume>55</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>The</surname>
            <given-names>MITRE Corporation</given-names>
          </string-name>
          ,
          <article-title>"Science of Cyber-Security," The MITRE Corporation, McLean</article-title>
          ,
          <string-name>
            <surname>VA</surname>
          </string-name>
          ,
          <year>Technical 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Mundie</surname>
            ,
            <given-names>D. A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>McIntire</surname>
            ,
            <given-names>D. M. "</given-names>
          </string-name>
          <article-title>The MAL: A Malware Analysis Lexicon,"</article-title>
          <source>CERT®</source>
          Program - Carnegie Mellon University ,
          <year>Technical 2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Dipert</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>"The Essential Features of an Ontology for Cyberwarfare," in Conflict and Cooperation in Cyberspace - The Challenge to National Security, Panayotis A Yannakogeorgos and</article-title>
          A. B. Lowther, Eds.: Taylor &amp; Francis,
          <year>2013</year>
          , pp.
          <fpage>35</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kotenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <article-title>"Agent-Based modeling and simulation of cyber-warfare between malefactors and security agents in internet ,"</article-title>
          <source>in 19th European Conference on Modeling and Simulation</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D</given-names>
            <surname>'Amico</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Buchanan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Goodall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            &amp;
            <surname>Walczak</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Mission impact of cyber events: Scenarios and ontology to express the relationship between cyber assets</article-title>
          . [Online]. http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA517410
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Obrst</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chase</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Markeloff</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>"Developing an ontology of the cyber security domain,"</article-title>
          <source>in Seventh International Conference on Semantic Technologies for Intelligence</source>
          , Defense, and
          <string-name>
            <surname>Security</surname>
          </string-name>
          ,
          <year>2012</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>56</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          "
          <string-name>
            <surname>The Irresistible</surname>
            <given-names>SRIQ</given-names>
          </string-name>
          ,
          <article-title>" in OWLED '05 - "OWL: Experiences and Directions"</article-title>
          , vol.
          <volume>188</volume>
          ,
          <string-name>
            <surname>Galway</surname>
          </string-name>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Masolo</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borgo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guarino</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oltramari</surname>
            , Schneider,
            <given-names>L. A.</given-names>
          </string-name>
          "
          <article-title>The WonderWeb Library of Foundational Ontologies and the DOLCE ontology," Laboratory For Applied Ontology</article-title>
          , ISTC-CNR,
          <source>Technical Report</source>
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Vetere</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jezek</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chiari</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zanzotto</surname>
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nissim</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gangemi</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Oltramari</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>"Senso Comune: A Collaborative Knowledge Resource for Italian," in The People's Web Meets NLP: Collaboratively Constructed Language Resources</article-title>
          .: Springer Verlag,
          <year>2013</year>
          , pp.
          <fpage>45</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mika</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <article-title>"Understanding the Semantic Web through Descriptions and Situations,"</article-title>
          <source>in On The Move to Meaningful Internet Systems - Lecture Notes in Computer Science</source>
          . Berlin-Heidelberg: Springer,
          <year>2003</year>
          , vol.
          <volume>2888</volume>
          , pp.
          <fpage>689</fpage>
          -
          <lpage>706</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Salinesi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wattiau</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Souag</surname>
          </string-name>
          ,
          <article-title>"Ontologies for Security Requirements: A Literature Survey and Classification,"</article-title>
          <source>in Advanced Information Systems Engineering Workshops</source>
          , vol.
          <volume>112</volume>
          ,
          <year>2012</year>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Schumacher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>"Toward a Security Core Ontology," in Security Engineering with Patterns</article-title>
          . Berling-Heidelberg: Springer-Verlag,
          <year>2003</year>
          , pp.
          <fpage>87</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Fenz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ekelhart</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>"Formalizing Information Security Knowledge,"</article-title>
          <source>in the International Symposium on Information, Computer, and Communications Security (ASIACCS '09)</source>
          , New York, pp.
          <fpage>183</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Avižienis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laprie</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Randell</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Landwehr</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <article-title>"Basic Concepts and Taxonomy of Dependable and Secure Computing,"</article-title>
          <source>IEEE Transactions on Dependable and Secure Computing</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>33</lpage>
          , January-March
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Prévot</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borgo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oltramari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>"Interfacing Ontologies and Lexical Resources," in Ontology and the Lexicon -</article-title>
          A
          <string-name>
            <surname>Natural Language Perspective</surname>
            ,
            <given-names>C.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calzolari</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oltramari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prévot</surname>
          </string-name>
          , L. Huang, Ed. New York, USA: Cambridge University Press,
          <year>2010</year>
          , pp.
          <fpage>185</fpage>
          -
          <lpage>200</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Massacci</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paci</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thein</surname>
          </string-name>
          , T.T.,
          <string-name>
            <surname>Yijun</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          "
          <article-title>An Extended Ontology for Security Requirements"</article-title>
          .
          <source>In CAiSE 2011 International Workshops</source>
          , vol.
          <volume>83</volume>
          , London,
          <year>2011</year>
          , pp.
          <fpage>622</fpage>
          -
          <lpage>636</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <article-title>Joint Staff Department of Defense. Joint Terminology for Cyber Operations</article-title>
          . [Online]. http://afri.au.af.mil/cyber/Docs/panel1/Cyber_Lexicon.pdf
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <article-title>Joint Chiefs of Staff, "The National Military Strategy for Cyberspace Operations,"</article-title>
          <source>Department of Defense</source>
          ,
          <year>2006</year>
          . [Online]. http://www.dod.mil/pubs/foi/joint_staff/jointStaff_jointOpe rations/07-F-2105doc1.pdf
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Air</given-names>
            <surname>Force Doctrine Document</surname>
          </string-name>
          ,
          <article-title>"Cyberspace Operations,"</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Simmons</surname>
            ,
            <given-names>C. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shiva</surname>
            ,
            <given-names>S. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bedi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <article-title>Dasgupta "AVOIDIT: A Cyber Attack Taxonomy,"</article-title>
          <source>in 9th Annual Symposium on Information Assurance (ASIA)</source>
          , Albany, NY,
          <year>2014</year>
          , pp.
          <fpage>2</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Allen</surname>
            ,
            <given-names>J.F. "</given-names>
          </string-name>
          <article-title>An interval based representation of temporal knowledge,"</article-title>
          <source>in 7th International Joint Conference on Artificial Intelligence (IJCAI)</source>
          , vol.
          <volume>1</volume>
          , Vancouver,
          <year>1983</year>
          , pp.
          <fpage>221</fpage>
          -
          <lpage>226</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Presutti</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>"Ontology design patterns," in Handbook on Ontologies</article-title>
          .: Springer ,
          <year>2009</year>
          , pp.
          <fpage>221</fpage>
          -
          <lpage>244</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Morris</surname>
            ,
            <given-names>T.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mayron</surname>
            ,
            <given-names>L.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>W.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knepper</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reg</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>K.L. "</given-names>
          </string-name>
          <article-title>A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance," in IEEE Multi-disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support</article-title>
          , Miami Beach,
          <year>2011</year>
          , pp.
          <fpage>60</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Taylor</surname>
            ,
            <given-names>S.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pham</surname>
            <given-names>L.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivkin</surname>
            <given-names>I.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Armor</surname>
            <given-names>D.A.</given-names>
          </string-name>
          <article-title>"Harnessing the imagination</article-title>
          .
          <source>Mental simulation, selfregulation, and coping.," American Psychologist</source>
          , vol.
          <volume>53</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>429</fpage>
          -
          <lpage>439</lpage>
          ,
          <year>Apr 1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Gonzalez</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ben-Asher</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oltramari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lebiere</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <article-title>"Cognitive Models of Cyber Situation Awareness and Decision Making," in Cyber Defense</article-title>
          and
          <string-name>
            <given-names>Situational</given-names>
            <surname>Awareness</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Erbacher</surname>
          </string-name>
          , R. Kott, Ed.: Springer,
          <year>2014</year>
          , vol.
          <volume>62</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Masolo</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guizzardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vieu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bottazzi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferrario</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>"Relational Roles and Qua Individuals"</article-title>
          .
          <source>In AAAI Fall Symposium on Roles, an Interdisciplinary Perspective</source>
          , Virginia, USA.
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>