<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Evaluation Process of a Computer Security Incident Ontology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Luciana A. F. Martimiano</string-name>
          <email>luciana@icmc.usp.br</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Edson Moreira</string-name>
          <email>edson@icmc.usp.br</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Departamento de Ciˆencias de Computa ̧c ̃ao, Instituto de Ciˆencias Matem ́aticas e de Computa ̧c ̃ao, Universidade de S ̃ao Paulo - Campus S ̃ao Carlos</institution>
          ,
          <addr-line>Caixa Postal 668, CEP 13560-970, S ̃ao Carlos, SP</addr-line>
          ,
          <country country="BR">Brazil</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Ontologies have been developed and used by several researchers in different knowledge domains aiming to ease the structuring and management of knowledge, and to create a unique standard to represent concepts of such a knowledge domain. Considering the computer security domain, several tools can be used to manage and store security information. These tools generate a great amount of security alerts, which are stored in different formats. This lack of standard and the amount of data make the tasks of the security administrators even harder, because they have to understand, using their tacit knowledge, different security alerts to make correlation and solve security problems. Aiming to assist the administrators in executing these tasks efficiently, this paper presents the main features of the computer security incident ontology developed to model, using a unique standard, the concepts of the security incident domain, and how the ontology has been evaluated.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Security data can be generated by different sources, such as access systems logs,
firewall logs, vulnerabilities alerts, and statistics of processors or memory use.
Due to this great volume of information, the security administrators face out a
difficult problem, which is efficiently generate knowledge about security to make
decisions and solve security incidents.</p>
      <p>
        Besides this volume of information, the security tools generate data in
different formats, making the security management even harder. Some research
institutes, such as CVE Project (Common Vulnerabilities and Exposures) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
and CERT/CC (Computer Emergency Response Team/Coordination Center)1
have made efforts to classify and store security data using a unique standard.
However, these institutes do not attribute semantic to the data stored and
published. Without the semantic meaning, the software agents or the administrators
are unable to automatically make implicit correlations among security incidents.
      </p>
      <p>To ease and make it possible to automatically correlate different security data
from different sources, and also to ease information management about security</p>
    </sec>
    <sec id="sec-2">
      <title>1 http://www.cert.org/.</title>
      <p>incidents, we propose to use ontologies, defining a unique vocabulary of concepts
and relations related to security incidents2.</p>
      <p>
        According to Gruber [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], ontology is explicit formal specifications of the
concepts in a domain and the relations among them. Ontology defines a common
vocabulary for a community of people, such as researchers and security
administrators, and for software agents that need to share information and need to have
a common understanding about a domain knowledge. Ontologies consist of a set
of concepts, relations, and axioms that formalize a field of interest, with detail
and structure that enable computers to process its content.
      </p>
      <p>
        Some reasons to develop and to use ontologies are [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]:
– Sharing common understanding of the structured information
among people or software agents. For instance, suppose that several
Web sites contain information about vulnerabilities. If these Web sites share
and publish the same ontology of the concepts and relations they use,
software agents can extract and aggregate information from these different sites,
using them to answer queries about vulnerabilities or as input data to other
applications.
– Reusing knowledge. If one group of researchers develops an ontology,
others can simply reuse it, saving efforts. For instance, the Computer Security
Incident Ontology (OntoSec) [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] developed and described in this paper
reuses some concepts and relations of the Vulnerability Ontology developed
by Brand˜ao [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Or, a network management ontology could reuse and extend
the class Asset defined by OntoSec to represent the assets that can be
attacked in a computational system.
– Interoperability. Different applications can use the concepts and the
relations defined by an Ontology (e.g. OntoSec) to extract and infer useful
information to deal with vulnerabilities, easing the interoperability that
allows sharing data among different applications.
      </p>
      <p>The remainder of this paper is organized as follows. Section 2 presents some
security issues. Section 3 briefly presents the related works. Section 4 presents
the Security Incident Ontology developed and its main features. The ontology
validation process is presented in Section 5. Section 6 presents the main benefits
of using ontology to help security management. And, finally, Section 7 presents
final remarks and future works.
2</p>
      <sec id="sec-2-1">
        <title>Computational Security Issues</title>
        <p>
          According to Gollmann [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], computational security deals with the prevention and
the detection of unauthorized actions done in a computational system, its
information and resources. A secure system must satisfy some important features:
confidentiality, integrity, availability and authentication. Confidentiality assures
2 A security incident is “the act of violating an explicit or implied security policy”,
which is a CERT/CC definition.
that only authorized people or systems access the information, and it is related
to the Authentication, which ensures that the user is really who he/she says.
Integrity ensures that the information is not modified accidentally or maliciously.
Availability ensures that the system works with no degradation and provides
resources whenever authorized users need. The satisfaction grade is defined by
a security policy, which creates the rules of what is and what is not allowed in
the system.
        </p>
        <p>Along the years, the volume of security data that the security administrators
have to manage has grown exponentially. Unfortunately, managing these data
and information has became more and more difficult, because different security
tools generate alerts in a different standard and with different kinds of data, and
the administrators, using their tacit knowledge, have to correlate and analyze
these data.</p>
        <p>In this sense, it is important to define a way to generate the security data
in a unique standard, including a unique vocabulary of concepts and their
relations. This unique vocabulary allows the security administrators to manage
and correlate different security incidents automatically, and also make it
possible to implement countermeasures to solve security incidents more efficiently
and to ensure the important features already mentioned, namely confidentiality,
integrity, availability and authentication.
3</p>
      </sec>
      <sec id="sec-2-2">
        <title>Related Works</title>
        <p>
          Howard and Longstaff [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] developed a common language for security incidents.
This common language is a high-level taxonomy of security incidents concepts.
The taxonomy was based primarily on security incident theory, but the
experience in incidents classification of CERT was used to refine and expand the
taxonomy. Basically, the incident taxonomy defines concepts as attacker, tool,
vulnerability and security incident. OntoSec reuses some of the concepts
defined in the security incident taxonomy.
        </p>
        <p>
          Two relevant works are the ones conducted by Raskin et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] and
Schumacher [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Raskin et al. proposed the use of natural language to define, in an
unique way, the meaning of the main concepts about security incidents.
Basically, the ontology is composed by two parts: a set of high-level concepts and
a method of classifying them as a taxonomy. Schumacher proposed the Core
Security Ontology to represent a conceptual mapping of security policies. The
ontology represents the top-level security concepts and how they related
themselves. Depending on the organization and its security policies, these concepts
can be specialized and new ones can be created. Both works propose an abstract
and high level vision of security management.
        </p>
        <p>OntoSec, on the other hand, represents not only the concepts but also the
relations among the concepts of the security incident domain. It also proposes a
more concrete vision of security management, because it specializes these main
concepts.</p>
      </sec>
      <sec id="sec-2-3">
        <title>The Security Incident Ontology</title>
        <p>
          To develop the OntoSec, two methodologies were used: the Methontology,
developed by Fern´andez et al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], and the methodology developed by Noy and
McGuinness [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. The Methontology was used to guide all the ontology
development process, because it was developed taking IEEE standard for developing
Software Life Cycle Processes (IEEE 1074-1995) [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] as a starting document,
and it has its roots in a methodology for developing Knowledge-Based Systems
(IDEAL [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]) [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. The methodology developed by Noy and McGuinness was
used to guide the conceptualization phase because it defines clearly what should
be done, and how it should be done.
        </p>
        <p>
          Most of the concepts in the OntoSec were compiled using security
incident glossaries and taxonomies [
          <xref ref-type="bibr" rid="ref16 ref17 ref9">16, 9, 17</xref>
          ]. Besides these sources, the CSIRT/USP
(Computer Security Incident Response Team/Universidade de S˜ao Paulo)3 was
also used.
        </p>
        <p>
          After defining the concepts and the relations among them, the OntoSec was
formalized using the W3C4 standard language for modeling ontologies - OWL
(Web Ontology Language) [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and the Prot´eg´e tool, which is a free, open-source
ontology editor and knowledge-base framework5.
        </p>
        <p>OntoSec has four levels of classes (or concepts). These four levels represent
the main concepts related to the security incident domain. The first level has 13
classes, which are presented in Figure 1, the second one has 11 classes, which
are the subclasses of the main level, the third one has 14 classes, which are the
subclasses of the second level, and the fourth one has 11 classes, which are the
subclasses of the third level, summing up 49 classes. Besides these classes, the
OntoSec has 36 non-hierarchical relations and 58 attributes, summing up 94
properties. The first level represents the “core” of the OntoSec.</p>
        <p>Figure 1 presents the main concepts and relations, which are: an Agent
performs an Attack that can cause a Security Incident. To perform an Attack,
an Agent can use a Tool, which can explore a Vulnerability, to get Access.
The Security Incident implies to a Consequence and acts on an Asset.
The Security Incident also can have a PreCondition, and this
PreCondition can be related to a Vulnerability. A Consequence can be related to an
Asset and a Security Incident can precede or/and proceed another one6. A
Vulnerability can be explored with other ones, it can has another vulnerability
as precondition, or it can be precondition to other vulnerabilities. It also has a
Correction, which is developed by a Supplier, a Type and a Range.</p>
        <p>The vulnerabilities are represented by the Vulnerability Ontology. The
Vulnerability Ontology models the main concepts and relations about the
vulnerability domain. These concepts and relations were defined based on CVE Project</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3 http://www.security.usp.br/.</title>
      <p>4 World Wide Web Consortium.</p>
    </sec>
    <sec id="sec-4">
      <title>5 http://protege.stanford.edu/.</title>
      <p>6 The relations precedes and proceeds are inverse, transitive, symmetric and reflexive.
and the NVD (National Vulnerability Database)7. And, some of these concepts
and relations are imported by OntoSec8. The main concepts imported are:
Vulnerability, Type, Correction, Range and Supplier.</p>
      <p>
        Some classes represent a taxonomy, with isA relations, which are
specialization and can be also called hyponymy relation. For instance, the class Asset has
as sub-classes: Data, Hardware, Port, Resource, RootAccount, Software
and UserAccount. The isA relations are represented using two constructors,
one in OWL and the other in RDF Schema (Resource Description Framework
Schema)[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]: owl:class and rdfs:subClassOf, respectively.
      </p>
      <p>To identify a security incident, some attributes were defined: hasip source
(computers from where a security incident begins), hasip destination
(computer being attacked), hassecurity incident type (27 security incidents types
are represented in OntoSec), has date (the date the security incident
oc7 NVD is a searchable index of information on computer vulnerabilities and was known
as ICAT Metabase. http://nvd.nist.gov/.
8 The label ontovul denotes this importing.
curred), has time (the time the security incident occurred), has description
(describe the security incident), has reference (any Web site with information
about the security incident), has weekday (week day in which the security
incident occurred), has severity (how serious is the security incident). This last
attribute can have the following predefined values: Low, Medium or High.</p>
      <p>All attributes are represented in OWL as a Datatype Property. This
property also defines which are the Domain Resource and the Range Resource. In
this case, the Domain Resource is the class which has the attribute and the
Range Resource is the type of attribute. Similarly to the Object Property,
the Datatype Property also can have a restriction as cardinality,
representing how many instances the property can have. It is also possible to predefine
instances. For example, the attribute has severity can have only one of the
following instances: Low, Medium or High.
5</p>
      <sec id="sec-4-1">
        <title>OntoSec Evaluation Process</title>
        <p>
          The ontology evaluation process is the problem of assessing the quality of a given
ontology, either to aid in the selection of an ontology for the needs of a particular
task or organization, or to evaluate or guide an ontology constructing effort [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
        </p>
        <p>
          Several approaches have been developed to evaluate an ontology, depending
on what kind of ontologies are being evaluated and for what purpose. Some
approaches are: to use the ontology in an application [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], to compare the ontology
to a “golden standard” of the domain [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ], to compare the ontology with a source
of data or documents about the domain that is represented by the ontology
the “data driven” approach [
          <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
          ], and to assess how well the ontology meets a
set of predefined criteria, standards and requirements, etc. [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>
          To validate the OntoSec, the approach defined by [
          <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
          ] was used, because
this approach defines a way to check if the ontology is representing the concepts
of such a domain knowledge. In this sense, security alerts from SNORT was
used to check how well OntoSec cover the security incident domain. SNORT
is an open-source network intrusion prevention and detection system based on a
rule-driven language9.
5.1
        </p>
        <p>Validation Process
The main aim of the validation process is to show that OntoSec represents
important information about security incidents correctly. Besides that, it is also
important to show that OntoSec can help the security administrators to deal
with security incidents problems more efficiently, querying the ontology about
security incidents. The validation process has been carried out in two phases:
1. Mapping security incident data into OntoSec, which has been done.
2. Developing an application to query and infer security incident information
from OntoSec, which is under development.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>9 http://www.snort.org/.</title>
      <p>Mapping Security Incident Data. Security alerts generated by SNORT were
used to validate the OntoSec. SNORT generates intrusion alerts based on rules
according to signatures of attacks. The following example shows an alert
generated by SNORT. Line 1 presents the alert description and line 2 presents its
classification and priority (severity) according to SNORT configuration. Line
3 presents when (date and time) this alert occurred and which are the source
IP, source port, destination IP and destination port used. Lines 4 to 8 present
URLs10 where it is possible to find information about the alert.
1 [**] [1:1421:11] SNMP AgentX/tcp request [**]
2 [Classification: Attempted Information Leak] [Priority: 2]
3 01/20-11:11:38.672417 192.168.0.253:111 -&gt; 192.168.0.18:705
4 [Xref =&gt; http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0013]
5 [Xref =&gt; http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0012]
6 [Xref =&gt; http://www.securityfocus.com/bid/4132]
7 [Xref =&gt; http://www.securityfocus.com/bid/4089]
8 [Xref =&gt; http://www.securityfocus.com/bid/4088]</p>
      <p>To support OntoSec validation process, a tool was developed using Java and
Jena11. This tool does the mapping of the security alerts generated by SNORT
into OntoSec, creating a security knowledge base that is used in the next phase
of the validation process (query and inference). As RDF has a simple data model
that is easy for applications to process and manipulate and RDFt’s generality
offers greater value from sharing, it is used to store the security incident knowledge
base instead of storing the base inside the ontology itself.</p>
      <p>The following RDF code represents the information about the “SNMP
AgentX/tcp request” alert. For each rdf:description, RDF creates a nodeID.
The nodeIDs are also used to relate a security incident to the logical ports
(rdf:nodeID=A5151) and to the protocols (rdf:nodeID=A3989) used during the
attack.
10 Universal Resource Locator.
11 Jena is an open-source Java framework for building Semantic Web applications.
http://jena.sourceforge.net/.</p>
      <p>&lt;j.0:has_sourceportnumber&gt;111&lt;/j.0:has_sourceportnumber&gt;
&lt;j.0:has_destinyportnumber&gt;705&lt;/j.0:has_destinyportnumber&gt;
&lt;/rdf:Description&gt;
&lt;rdf:Description rdf:nodeID="A3989"&gt;
&lt;rdf:type rdf:resource="http://a.com/SecurityIncidentOntology#Protocol"/&gt;
&lt;j.0:hasprotocol_name&gt;TCP&lt;/j.0:hasprotocol_name&gt;
&lt;/rdf:Description&gt;
&lt;/rdf:Description&gt;</p>
      <p>The tool is composed by two parts: one responsible to collect and structure
the SNORT alerts, and another to do the mapping into the ontology. As the tool
was developed using a modular structure, the task of integrating new security
tools is easier, only the interface between the mapping tool and the security tool
has to be modified. As SNORT generates security alerts using a standard (text
files), to get the security data was an easy task to be done. A security alert file
of 600KBytes were use. This alert file generated a security incident knowledge
base of 20MBytes. This knowledge base is stored in a MySQL12 database13. Jena
framework was used to store the RDF file in the database. Herein, it is important
to point out that not necessarily the security alerts generated by SNORT are
really security incidents, many of these alerts are false-positives. But the security
alerts were used to know how well the OntoSec models security incidents.</p>
      <p>Some data could be directly mapped into OntoSec, such as description,
date, time, source and destination IP, source and destination port. But others,
as the incident type, could not be because SNORT uses its own standard types
of incidents. In this case, a previous task was done in which a type of incident in
SNORT was mapping into a type of incident in OntoSec. For instance, the types
Attempted Information Leak and Detection of a Network Scan were mapping
as type Scanning in OntoSec, the types A Network Trojan was detected, A
suspicious string was detected and Executable code was detected were mapped as
Malicious Code.</p>
      <p>Some attributes, such as source and destination port, and protocol, are
mapped as relations between SecurityIncident and Asset classes, because in
OntoSec a protocol and a port are modeled as potential targets (assets) of such
a security incident.</p>
      <p>Table 1 shows an example of how some attributes were mapped into the
attributes of the SecurityIncident class, the Port and the Protocol classes
in OntoSec. From the date, the day of the week is calculated and the
has weekday attribute in OntoSec is used to represent it.</p>
      <p>It is possible to notice that OntoSec models important information about
security incident domain. On the other hand, it is also possible to see that the
ontology is modeling information that a security tool does not represent, such as
the consequences of a security incident. In this sense, according to the type of the
security incident, the ontology can be used to infer which are the consequences.
For instance, a Dos (Denial of Service), DDos (Distribuited Denial of Service) or
12 http://www.mysql.com/.
13 To perform previous tests with the knowledge base, it was stored firstly in a text file
a Buffer Overflow can compromise the availability of the system. Or a Malicious
Code can allow a remote execution or can compromise data confidentiality.
Querying and Inference Application. Once the security alerts have been
stored in RDF using a MySQL database, it is possible to ask questions to the
ontology. This task allows to check how well the ontology can answer important
questions about security incidents. To perform this task, Jena and a specific
RDF querying language, SPARQL14, have been used. SPARQL is a SQL-like15
language that uses the basic clause SELECT FROM WHERE.</p>
      <p>Using the querying and inference application, the security administrators can
ask questions like:
– How many security incidents have happened because of such a vulnerability?
– Which are the most common types of security incidents?
– Which are the assets that have more security problems and must to receive
more attention concerning patches?
– Which security incidents have happened after a previous security incident
(looking for correlation)?
– Which are the most common ports used to perform a security incident?
The following two examples show how a query is done using SPARQL.
(i) Which security incidents happened on January 15, 2006?
Prefix ab: &lt;http://a.com/SecurityIncidentOntology#&gt;
Select Distinct ?incident ?type
Where { ?x ab:has_date "2006-01-15";
ab:has_description ?incident;
ab:hassecurity_incident_type ?type} Order by ?x
14 Recursively, SPARQL Protocol and RDF Query Language. http://www.w3.org/TR/
rdf-sparql-query/.
15 Structured Query Language.</p>
      <p>(ii) Which security incidents were caused by a malicious code?
Prefix ab: &lt;http://a.com/SecurityIncidentOntology#&gt;
Select distinct ?incident ?date
Where { ?a ab:hassecurity_incident_type "Malicious Code";
ab:has_description ?incident;
ab:has_date ?date}</p>
      <p>The results of these queries allow the administrators to know which
incidents happened in a specific day and which incidents were caused by a malicious
code, respectivelly. If many incidents happen because of malicious codes, such
as viruses or worms, the administrators can update the computational systems
more frequently. Combining both queries, it is also possible to know in which
date security incidents caused by malicious codes happen. Using the results, the
administrators can prevent attacks that happen on specific periods.
6</p>
      <sec id="sec-5-1">
        <title>Benefits of OntoSec in Information Security</title>
      </sec>
      <sec id="sec-5-2">
        <title>Management</title>
        <p>We can point out the following advantages of using ontologies to assist the
information security management:
– The development of ontologies creates a conceptual model that makes it
possible to the organization to know better its security incidents domain.
– The ontologies can facilitate the interoperability among different security
tools, creating a unique way to represent security data and, for instance,
allowing that security alerts from any security tool is mapped into an ontology.
– The Security Incident Ontology imports the Vulnerability Ontology, allowing
the reuse of knowledge and information. Other ontologies about security
domain could be imported, such as a Virus Ontology or a Worm Ontology.
The same reuse can be scaled up in such a way that security information can
be treated in a more abstract level.
– The querying and inference process helps the security administrators to be
more confident of the decisions made about the security information
management, because the ontology developed is knowledge bases about
security incidents. The ontology allows the security administrators to learn from
previous security problems, assisting them in solving and preventing new
problems.
7</p>
      </sec>
      <sec id="sec-5-3">
        <title>Final Remarks and Future Works</title>
        <p>
          Not only ontologies can fundamentally change the way in which systems are
constructed, as stated by Swartout and Tate [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], but they also will change
the way people and systems can communicate to each other about a domain
knowledge.
        </p>
        <p>Using a security incident ontology, the organization can improve its ability to
manage and to control security incidents problems. Besides that, the
administrators can learn more about security and can prevent the computational systems
from previous problems efficiently.</p>
        <p>The mapping process shows that the ontology models important information
about security incidents. The querying and inference process helps the security
administrators to be more confident of the decisions made about the security
management, because OntoSec allows to create a knowledge base about
security incidents.</p>
        <p>The next steps of the validation process are: (i) to use real security incidents
(security incidents from the CSIRT/USP will be used), (ii) to map security alerts
from other security tools, and (iii) to develop a security incident management
system based on the ontology, making it easier the interoperability among
different security tools.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Mann</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Christey</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          :
          <article-title>Towards a common enumeration of vulnerabilities (</article-title>
          <year>1999</year>
          ) http://cve.mitre.org.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Gruber</surname>
            ,
            <given-names>T.R.</given-names>
          </string-name>
          :
          <article-title>Toward principles for the design of ontologies used for knowledge sharing</article-title>
          .
          <source>International Journal of Human-Computer Studies</source>
          <volume>43</volume>
          (
          <issue>5</issue>
          /6) (
          <year>1995</year>
          )
          <fpage>907</fpage>
          -
          <lpage>928</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Noy</surname>
            ,
            <given-names>N.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuiness</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          :
          <article-title>Ontology development 101: A guide to create your first ontology</article-title>
          .
          <source>Technical report, Knowledge Systems</source>
          Laboratory - Stanford University (
          <year>2001</year>
          ) TR KSL-
          <volume>01</volume>
          -05.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Uschold</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gruninger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Ontologies: principles, methods and applications</article-title>
          .
          <source>Knowledge Engineering Review</source>
          <volume>11</volume>
          (
          <issue>2</issue>
          ) (
          <year>1996</year>
          )
          <fpage>93</fpage>
          -
          <lpage>155</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Martimiano</surname>
            ,
            <given-names>A.F.M.</given-names>
          </string-name>
          , Brand˜ao,
          <string-name>
            <given-names>A.J.S.</given-names>
            ,
            <surname>Moreira</surname>
          </string-name>
          ,
          <string-name>
            <surname>E.S.</surname>
          </string-name>
          :
          <article-title>Towards a security network incident ontology to ease the security knowledge management</article-title>
          .
          <source>In: Proceedings of the Third International Information and Telecommunication Techniques Symposium (I2TS2004)</source>
          . (
          <year>2004</year>
          )
          <fpage>88</fpage>
          -
          <lpage>95</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Martimiano</surname>
            ,
            <given-names>A.F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moreira</surname>
            ,
            <given-names>E.S.:</given-names>
          </string-name>
          <article-title>An owl-based security incident ontology</article-title>
          . In: Proceedings of the Eighth International Prot´eg´e Conference. (
          <year>2005</year>
          )
          <fpage>43</fpage>
          -
          <lpage>44</lpage>
          Poster.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Brand˜ao,
          <string-name>
            <surname>A.J.S.:</surname>
          </string-name>
          <article-title>Uso de ontologia para classifica¸c˜ao de vulnerabilidades em sistemas computacionais</article-title>
          .
          <source>Master's thesis</source>
          , Instituto de Ciˆencias Matem´aticas e de Computa¸c˜ao - ICMC, Universidade de S˜ao Paulo - USP, S˜ao Carlos - S˜ao Paulo (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Gollmann</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Computer Security. John Wiley &amp; Sons (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Howard</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Longstaff</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          :
          <article-title>A common language for computer security incidents</article-title>
          .
          <source>Technical report, Sandia National Laboratories</source>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Raskin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hempelmann</surname>
            ,
            <given-names>C.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Triezenberg</surname>
            ,
            <given-names>K.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nirenburg</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Ontology in information security: A useful theoretical foundation and methodology tool</article-title>
          .
          <source>In: Proceedings of the Workshop on New Security Paradigms</source>
          . (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Schumacher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Toward a security core ontology</article-title>
          .
          <source>In: Security Engineering with Patterns - Origins, Theoretical Model and New Applications</source>
          . Springer Verlag (
          <year>2003</year>
          )
          <fpage>87</fpage>
          -96 Lectures Notes in Computer Science (LNCS 2754).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. Fern´andez, M.A.,
          <string-name>
            <surname>G´</surname>
          </string-name>
          <article-title>omez-P´erez,</article-title>
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Juristo</surname>
          </string-name>
          , N.:
          <article-title>Methontology: From ontological art towards ontological engineering</article-title>
          .
          <source>In: Proceedings of the AAAI Spring Symposium Series</source>
          . (
          <year>1997</year>
          )
          <fpage>33</fpage>
          -
          <lpage>40</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. IEEE:
          <article-title>IEEE standard for developing software life cycle processes (1996) IEEE Computing Society</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. G´
          <article-title>omez-P´erez,</article-title>
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Juristo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Montes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Pazos</surname>
          </string-name>
          , J.:
          <article-title>Ingenier´ıa del conocimiento: Disen˜o y construcci´on de sistemas expertos (1997) Ceura</article-title>
          , Madri, Spain.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. L´opez, M.F.:
          <article-title>Overview of methodologies for building ontologies</article-title>
          .
          <source>In: Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI99</source>
          ) - Workshop on Ontologies and
          <string-name>
            <surname>Problem-Solving</surname>
            <given-names>Methods</given-names>
          </string-name>
          : Lessons Learned and
          <string-name>
            <surname>Future Trends.</surname>
          </string-name>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. NCSC:
          <article-title>Glossary of computer security terms (</article-title>
          <year>1988</year>
          ) National Computer Security Center - Trusted
          <string-name>
            <surname>Network (NCSC-TG-</surname>
          </string-name>
          004).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Shirey</surname>
          </string-name>
          , R.: RFC 2828:
          <article-title>Internet security glossary (2000) GTE-BBN Technologies</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Bechhofer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harmelen</surname>
            ,
            <given-names>F.v.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>PatelSchneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>L.A.</given-names>
          </string-name>
          :
          <article-title>OWL web ontology language reference (</article-title>
          <year>2004</year>
          ) http://www.w3.org/TR/owl-ref/.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Brickley</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guha</surname>
            ,
            <given-names>R.V.</given-names>
          </string-name>
          :
          <article-title>RDF vocabulary description language 1.0: RDFSchema (</article-title>
          <year>2004</year>
          ) http://www.w3.org/TR/rdf-schema/.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Brank</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grobelnik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mladeniae</surname>
            ,
            <given-names>D.:</given-names>
          </string-name>
          <article-title>A survey of ontology evaluation techniques</article-title>
          .
          <source>In: Proceedings of the Conference on Data Mining and Data Warehouses (SiKDD05)</source>
          . (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Porzel</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malaka</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A task-based approach for ontology evaluation</article-title>
          .
          <source>In: Proceedings of the Workshop on Ontology Learning and Population (ECAI2004) - Sixteenth European Conference on Artificial Intelligence</source>
          . (
          <year>2004</year>
          )
          <fpage>9</fpage>
          -
          <lpage>16</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Maedche</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Measuring similarity between ontologies</article-title>
          .
          <source>In: Proceeding of the Thirteenth European Conference on Knowledge Acquisition and Management (EKAW02)</source>
          . (
          <year>2002</year>
          )
          <fpage>251</fpage>
          -
          <lpage>263</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Brewster</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alani</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dasmahapatra</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wilks</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Data driven ontology evaluation</article-title>
          .
          <source>In: Proceedings of the International Conference on Language Resources and Evaluation</source>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Chintan</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaustubh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yugyung</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>E.K.</given-names>
          </string-name>
          :
          <article-title>Ontokhoj: A semantic web portal for ontology searching, ranking and classification</article-title>
          .
          <source>In: Proceedings of the Fifth ACM International Workshop on Web Information and Data Management</source>
          . (
          <year>2004</year>
          )
          <fpage>58</fpage>
          -
          <lpage>61</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Lozano-Tello</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>G´</surname>
          </string-name>
          <article-title>omez-P´erez, A.: Ontometric: A method to choose the appropriate ontology</article-title>
          .
          <source>Journal of Database Management</source>
          <volume>15</volume>
          (
          <issue>2</issue>
          ) (
          <year>2004</year>
          )
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Swartout</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tate</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <source>Ontologies. IEEE Intelligent Systems</source>
          <volume>14</volume>
          (
          <issue>1</issue>
          ) (
          <year>1999</year>
          )
          <fpage>18</fpage>
          -
          <lpage>19</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>