<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Evaluation Process of a Computer Security Incident Ontology</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Luciana</forename><forename type="middle">A F</forename><surname>Martimiano</surname></persName>
							<email>luciana@icmc.usp.br</email>
						</author>
						<author>
							<persName><forename type="first">Edson</forename><surname>Moreira</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="department">Departamento de Ciências de Computação</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Instituto de Ciências Matemáticas e de Computação</orgName>
								<orgName type="institution">Universidade de São Paulo -Campus São Carlos</orgName>
								<address>
									<addrLine>Caixa Postal 668, CEP</addrLine>
									<postCode>13560-970</postCode>
									<settlement>São Carlos</settlement>
									<region>SP</region>
									<country key="BR">Brazil</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Computational Security Issues</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">The Evaluation Process of a Computer Security Incident Ontology</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">1A76D821BEE506C8B64D5837AD1C405E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T22:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>confidentiality</term>
					<term>integrity</term>
					<term>availability and authentication. Confidentiality assures</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Ontologies have been developed and used by several researchers in different knowledge domains aiming to ease the structuring and management of knowledge, and to create a unique standard to represent concepts of such a knowledge domain. Considering the computer security domain, several tools can be used to manage and store security information. These tools generate a great amount of security alerts, which are stored in different formats. This lack of standard and the amount of data make the tasks of the security administrators even harder, because they have to understand, using their tacit knowledge, different security alerts to make correlation and solve security problems. Aiming to assist the administrators in executing these tasks efficiently, this paper presents the main features of the computer security incident ontology developed to model, using a unique standard, the concepts of the security incident domain, and how the ontology has been evaluated.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Security data can be generated by different sources, such as access systems logs, firewall logs, vulnerabilities alerts, and statistics of processors or memory use. Due to this great volume of information, the security administrators face out a difficult problem, which is efficiently generate knowledge about security to make decisions and solve security incidents.</p><p>Besides this volume of information, the security tools generate data in different formats, making the security management even harder. Some research institutes, such as CVE Project (Common Vulnerabilities and Exposures) <ref type="bibr" target="#b2">[1]</ref> and CERT/CC (Computer Emergency Response Team/Coordination Center) <ref type="foot" target="#foot_0">1</ref>have made efforts to classify and store security data using a unique standard. However, these institutes do not attribute semantic to the data stored and published. Without the semantic meaning, the software agents or the administrators are unable to automatically make implicit correlations among security incidents.</p><p>To ease and make it possible to automatically correlate different security data from different sources, and also to ease information management about security incidents, we propose to use ontologies, defining a unique vocabulary of concepts and relations related to security incidents <ref type="foot" target="#foot_1">2</ref> .</p><p>According to Gruber <ref type="bibr" target="#b3">[2]</ref>, ontology is explicit formal specifications of the concepts in a domain and the relations among them. Ontology defines a common vocabulary for a community of people, such as researchers and security administrators, and for software agents that need to share information and need to have a common understanding about a domain knowledge. Ontologies consist of a set of concepts, relations, and axioms that formalize a field of interest, with detail and structure that enable computers to process its content.</p><p>Some reasons to develop and to use ontologies are <ref type="bibr" target="#b4">[3,</ref><ref type="bibr" target="#b5">4]</ref>:</p><p>-Sharing common understanding of the structured information among people or software agents. For instance, suppose that several Web sites contain information about vulnerabilities. If these Web sites share and publish the same ontology of the concepts and relations they use, software agents can extract and aggregate information from these different sites, using them to answer queries about vulnerabilities or as input data to other applications. -Reusing knowledge. If one group of researchers develops an ontology, others can simply reuse it, saving efforts. For instance, the Computer Security Incident Ontology (OntoSec) <ref type="bibr" target="#b6">[5,</ref><ref type="bibr" target="#b7">6]</ref> developed and described in this paper reuses some concepts and relations of the Vulnerability Ontology developed by Brandão <ref type="bibr" target="#b8">[7]</ref>. Or, a network management ontology could reuse and extend the class Asset defined by OntoSec to represent the assets that can be attacked in a computational system. -Interoperability. Different applications can use the concepts and the relations defined by an Ontology (e.g. OntoSec) to extract and infer useful information to deal with vulnerabilities, easing the interoperability that allows sharing data among different applications.</p><p>The remainder of this paper is organized as follows. Section 2 presents some security issues. Section 3 briefly presents the related works. Section 4 presents the Security Incident Ontology developed and its main features. The ontology validation process is presented in Section 5. Section 6 presents the main benefits of using ontology to help security management. And, finally, Section 7 presents final remarks and future works. that only authorized people or systems access the information, and it is related to the Authentication, which ensures that the user is really who he/she says. Integrity ensures that the information is not modified accidentally or maliciously. Availability ensures that the system works with no degradation and provides resources whenever authorized users need. The satisfaction grade is defined by a security policy, which creates the rules of what is and what is not allowed in the system.</p><p>Along the years, the volume of security data that the security administrators have to manage has grown exponentially. Unfortunately, managing these data and information has became more and more difficult, because different security tools generate alerts in a different standard and with different kinds of data, and the administrators, using their tacit knowledge, have to correlate and analyze these data.</p><p>In this sense, it is important to define a way to generate the security data in a unique standard, including a unique vocabulary of concepts and their relations. This unique vocabulary allows the security administrators to manage and correlate different security incidents automatically, and also make it possible to implement countermeasures to solve security incidents more efficiently and to ensure the important features already mentioned, namely confidentiality, integrity, availability and authentication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Related Works</head><p>Howard and Longstaff <ref type="bibr" target="#b10">[9]</ref> developed a common language for security incidents. This common language is a high-level taxonomy of security incidents concepts. The taxonomy was based primarily on security incident theory, but the experience in incidents classification of CERT was used to refine and expand the taxonomy. Basically, the incident taxonomy defines concepts as attacker, tool, vulnerability and security incident. OntoSec reuses some of the concepts defined in the security incident taxonomy.</p><p>Two relevant works are the ones conducted by Raskin et al. <ref type="bibr" target="#b11">[10]</ref> and Schumacher <ref type="bibr">[11]</ref>. <ref type="bibr">Raskin et al.</ref> proposed the use of natural language to define, in an unique way, the meaning of the main concepts about security incidents. Basically, the ontology is composed by two parts: a set of high-level concepts and a method of classifying them as a taxonomy. Schumacher proposed the Core Security Ontology to represent a conceptual mapping of security policies. The ontology represents the top-level security concepts and how they related themselves. Depending on the organization and its security policies, these concepts can be specialized and new ones can be created. Both works propose an abstract and high level vision of security management.</p><p>OntoSec, on the other hand, represents not only the concepts but also the relations among the concepts of the security incident domain. It also proposes a more concrete vision of security management, because it specializes these main concepts.</p><p>To develop the OntoSec, two methodologies were used: the Methontology, developed by Fernández et al. <ref type="bibr" target="#b13">[12]</ref>, and the methodology developed by Noy and McGuinness <ref type="bibr" target="#b4">[3]</ref>. The Methontology was used to guide all the ontology development process, because it was developed taking IEEE standard for developing Software Life Cycle Processes (IEEE 1074-1995) <ref type="bibr" target="#b14">[13]</ref> as a starting document, and it has its roots in a methodology for developing Knowledge-Based Systems (IDEAL <ref type="bibr" target="#b15">[14]</ref>) <ref type="bibr" target="#b16">[15]</ref>. The methodology developed by Noy and McGuinness was used to guide the conceptualization phase because it defines clearly what should be done, and how it should be done.</p><p>Most of the concepts in the OntoSec were compiled using security incident glossaries and taxonomies <ref type="bibr" target="#b17">[16,</ref><ref type="bibr" target="#b10">9,</ref><ref type="bibr" target="#b18">17]</ref>. Besides these sources, the CSIRT/USP (Computer Security Incident Response Team/Universidade de São Paulo)<ref type="foot" target="#foot_2">3</ref> was also used.</p><p>After defining the concepts and the relations among them, the OntoSec was formalized using the W3C<ref type="foot" target="#foot_3">4</ref> standard language for modeling ontologies -OWL (Web Ontology Language) <ref type="bibr" target="#b19">[18]</ref> and the Protégé tool, which is a free, open-source ontology editor and knowledge-base framework <ref type="foot" target="#foot_4">5</ref> .</p><p>OntoSec has four levels of classes (or concepts). These four levels represent the main concepts related to the security incident domain. The first level has 13 classes, which are presented in Figure <ref type="figure" target="#fig_0">1</ref>, the second one has 11 classes, which are the subclasses of the main level, the third one has 14 classes, which are the subclasses of the second level, and the fourth one has 11 classes, which are the subclasses of the third level, summing up 49 classes. Besides these classes, the OntoSec has 36 non-hierarchical relations and 58 attributes, summing up 94 properties. The first level represents the "core" of the OntoSec.</p><p>Figure <ref type="figure" target="#fig_0">1</ref> presents the main concepts and relations, which are: an Agent performs an Attack that can cause a Security Incident. To perform an Attack, an Agent can use a Tool, which can explore a Vulnerability, to get Access. The Security Incident implies to a Consequence and acts on an Asset. The Security Incident also can have a PreCondition, and this PreCondition can be related to a Vulnerability. A Consequence can be related to an Asset and a Security Incident can precede or/and proceed another one <ref type="foot" target="#foot_5">6</ref> . A Vulnerability can be explored with other ones, it can has another vulnerability as precondition, or it can be precondition to other vulnerabilities. It also has a Correction, which is developed by a Supplier, a Type and a Range.</p><p>The vulnerabilities are represented by the Vulnerability Ontology. The Vulnerability Ontology models the main concepts and relations about the vulnerability domain. These concepts and relations were defined based on CVE Project and the NVD (National Vulnerability Database) <ref type="foot" target="#foot_6">7</ref> . And, some of these concepts and relations are imported by OntoSec<ref type="foot" target="#foot_7">8</ref> . The main concepts imported are: Vulnerability, Type, Correction, Range and Supplier.</p><p>Some classes represent a taxonomy, with isA relations, which are specialization and can be also called hyponymy relation. For instance, the class Asset has as sub-classes: Data, Hardware, Port, Resource, RootAccount, Software and UserAccount. The isA relations are represented using two constructors, one in OWL and the other in RDF Schema (Resource Description Framework Schema) <ref type="bibr" target="#b20">[19]</ref>: owl:class and rdfs:subClassOf, respectively. To identify a security incident, some attributes were defined: hasip source (computers from where a security incident begins), hasip destination (computer being attacked), hassecurity incident type (27 security incidents types are represented in OntoSec), has date (the date the security incident oc-curred), has time (the time the security incident occurred), has description (describe the security incident), has reference (any Web site with information about the security incident), has weekday (week day in which the security incident occurred), has severity (how serious is the security incident). This last attribute can have the following predefined values: Low, Medium or High.</p><p>All attributes are represented in OWL as a Datatype Property. This property also defines which are the Domain Resource and the Range Resource. In this case, the Domain Resource is the class which has the attribute and the Range Resource is the type of attribute. Similarly to the Object Property, the Datatype Property also can have a restriction as cardinality, representing how many instances the property can have. It is also possible to predefine instances. For example, the attribute has severity can have only one of the following instances: Low, Medium or High.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">OntoSec Evaluation Process</head><p>The ontology evaluation process is the problem of assessing the quality of a given ontology, either to aid in the selection of an ontology for the needs of a particular task or organization, or to evaluate or guide an ontology constructing effort <ref type="bibr" target="#b21">[20]</ref>.</p><p>Several approaches have been developed to evaluate an ontology, depending on what kind of ontologies are being evaluated and for what purpose. Some approaches are: to use the ontology in an application <ref type="bibr" target="#b22">[21]</ref>, to compare the ontology to a "golden standard" of the domain <ref type="bibr" target="#b23">[22]</ref>, to compare the ontology with a source of data or documents about the domain that is represented by the ontologythe "data driven" approach <ref type="bibr" target="#b24">[23,</ref><ref type="bibr" target="#b25">24]</ref>, and to assess how well the ontology meets a set of predefined criteria, standards and requirements, etc. <ref type="bibr" target="#b26">[25]</ref>.</p><p>To validate the OntoSec, the approach defined by <ref type="bibr" target="#b24">[23,</ref><ref type="bibr" target="#b25">24]</ref> was used, because this approach defines a way to check if the ontology is representing the concepts of such a domain knowledge. In this sense, security alerts from SNORT was used to check how well OntoSec cover the security incident domain. SNORT is an open-source network intrusion prevention and detection system based on a rule-driven language<ref type="foot" target="#foot_8">9</ref> .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Validation Process</head><p>The main aim of the validation process is to show that OntoSec represents important information about security incidents correctly. Besides that, it is also important to show that OntoSec can help the security administrators to deal with security incidents problems more efficiently, querying the ontology about security incidents. The validation process has been carried out in two phases:</p><p>1. Mapping security incident data into OntoSec, which has been done.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Developing an application to query and infer security incident information</head><p>from OntoSec, which is under development.</p><p>Mapping Security Incident Data. Security alerts generated by SNORT were used to validate the OntoSec. SNORT generates intrusion alerts based on rules according to signatures of attacks. The following example shows an alert generated by SNORT. Line 1 presents the alert description and line 2 presents its classification and priority (severity) according to SNORT configuration. Line 3 presents when (date and time) this alert occurred and which are the source IP, source port, destination IP and destination port used. Lines 4 to 8 present URLs 10 where it is possible to find information about the alert. To support OntoSec validation process, a tool was developed using Java and Jena 11 . This tool does the mapping of the security alerts generated by SNORT into OntoSec, creating a security knowledge base that is used in the next phase of the validation process (query and inference). As RDF has a simple data model that is easy for applications to process and manipulate and RDFt's generality offers greater value from sharing, it is used to store the security incident knowledge base instead of storing the base inside the ontology itself.</p><p>The following RDF code represents the information about the "SNMP AgentX/tcp request" alert. For each rdf:description, RDF creates a nodeID. The nodeIDs are also used to relate a security incident to the logical ports (rdf:nodeID=A5151) and to the protocols (rdf:nodeID=A3989) used during the attack. &lt;j.0:has_sourceportnumber&gt;111&lt;/j.0:has_sourceportnumber&gt; &lt;j.0:has_destinyportnumber&gt;705&lt;/j.0:has_destinyportnumber&gt; &lt;/rdf:Description&gt; &lt;rdf:Description rdf:nodeID="A3989"&gt; &lt;rdf:type rdf:resource="http://a.com/SecurityIncidentOntology#Protocol"/&gt; &lt;j.0:hasprotocol_name&gt;TCP&lt;/j.0:hasprotocol_name&gt; &lt;/rdf:Description&gt; &lt;/rdf:Description&gt;</p><p>The tool is composed by two parts: one responsible to collect and structure the SNORT alerts, and another to do the mapping into the ontology. As the tool was developed using a modular structure, the task of integrating new security tools is easier, only the interface between the mapping tool and the security tool has to be modified. As SNORT generates security alerts using a standard (text files), to get the security data was an easy task to be done. A security alert file of 600KBytes were use. This alert file generated a security incident knowledge base of 20MBytes. This knowledge base is stored in a MySQL<ref type="foot" target="#foot_9">12</ref> database<ref type="foot" target="#foot_10">13</ref> . Jena framework was used to store the RDF file in the database. Herein, it is important to point out that not necessarily the security alerts generated by SNORT are really security incidents, many of these alerts are false-positives. But the security alerts were used to know how well the OntoSec models security incidents. Some data could be directly mapped into OntoSec, such as description, date, time, source and destination IP, source and destination port. But others, as the incident type, could not be because SNORT uses its own standard types of incidents. In this case, a previous task was done in which a type of incident in SNORT was mapping into a type of incident in OntoSec. For instance, the types Attempted Information Leak and Detection of a Network Scan were mapping as type Scanning in OntoSec, the types A Network Trojan was detected, A suspicious string was detected and Executable code was detected were mapped as Malicious Code.</p><p>Some attributes, such as source and destination port, and protocol, are mapped as relations between SecurityIncident and Asset classes, because in OntoSec a protocol and a port are modeled as potential targets (assets) of such a security incident. Table <ref type="table" target="#tab_1">1</ref> shows an example of how some attributes were mapped into the attributes of the SecurityIncident class, the Port and the Protocol classes in OntoSec. From the date, the day of the week is calculated and the has weekday attribute in OntoSec is used to represent it.</p><p>It is possible to notice that OntoSec models important information about security incident domain. On the other hand, it is also possible to see that the ontology is modeling information that a security tool does not represent, such as the consequences of a security incident. In this sense, according to the type of the security incident, the ontology can be used to infer which are the consequences. For instance, a Dos (Denial of Service), DDos (Distribuited Denial of Service) or Querying and Inference Application. Once the security alerts have been stored in RDF using a MySQL database, it is possible to ask questions to the ontology. This task allows to check how well the ontology can answer important questions about security incidents. To perform this task, Jena and a specific RDF querying language, SPARQL <ref type="foot" target="#foot_11">14</ref> , have been used. SPARQL is a SQL-like 15 language that uses the basic clause SELECT FROM WHERE.</p><p>Using the querying and inference application, the security administrators can ask questions like:</p><p>-How many security incidents have happened because of such a vulnerability? -Which are the most common types of security incidents? -Which are the assets that have more security problems and must to receive more attention concerning patches? -Which security incidents have happened after a previous security incident (looking for correlation)? -Which are the most common ports used to perform a security incident?</p><p>The following two examples show how a query is done using SPARQL.</p><p>(i) Which security incidents happened on January The results of these queries allow the administrators to know which incidents happened in a specific day and which incidents were caused by a malicious code, respectivelly. If many incidents happen because of malicious codes, such as viruses or worms, the administrators can update the computational systems more frequently. Combining both queries, it is also possible to know in which date security incidents caused by malicious codes happen. Using the results, the administrators can prevent attacks that happen on specific periods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Benefits of OntoSec in Information Security Management</head><p>We can point out the following advantages of using ontologies to assist the information security management:</p><p>-The development of ontologies creates a conceptual model that makes it possible to the organization to know better its security incidents domain. -The ontologies can facilitate the interoperability among different security tools, creating a unique way to represent security data and, for instance, allowing that security alerts from any security tool is mapped into an ontology. -The Security Incident Ontology imports the Vulnerability Ontology, allowing the reuse of knowledge and information. Other ontologies about security domain could be imported, such as a Virus Ontology or a Worm Ontology. The same reuse can be scaled up in such a way that security information can be treated in a more abstract level. -The querying and inference process helps the security administrators to be more confident of the decisions made about the security information management, because the ontology developed is knowledge bases about security incidents. The ontology allows the security administrators to learn from previous security problems, assisting them in solving and preventing new problems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Final Remarks and Future Works</head><p>Not only ontologies can fundamentally change the way in which systems are constructed, as stated by Swartout and Tate <ref type="bibr" target="#b27">[26]</ref>, but they also will change the way people and systems can communicate to each other about a domain knowledge.</p><p>Using a security incident ontology, the organization can improve its ability to manage and to control security incidents problems. Besides that, the administrators can learn more about security and can prevent the computational systems from previous problems efficiently.</p><p>The mapping process shows that the ontology models important information about security incidents. The querying and inference process helps the security administrators to be more confident of the decisions made about the security management, because OntoSec allows to create a knowledge base about security incidents.</p><p>The next steps of the validation process are: (i) to use real security incidents (security incidents from the CSIRT/USP will be used), (ii) to map security alerts from other security tools, and (iii) to develop a security incident management system based on the ontology, making it easier the interoperability among different security tools.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Main concepts and relations of the OntoSec</figDesc><graphic coords="5,150.18,246.41,315.00,285.19" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>Mapping SNORT attributes into the OntoSec attributes Buffer Overflow can compromise the availability of the system. Or a Malicious Code can allow a remote execution or can compromise data confidentiality.</figDesc><table><row><cell cols="2">SNORT Attributes OntoSec Attributes</cell><cell>Class</cell></row><row><cell>description</cell><cell>has description</cell><cell>SecurityIncident</cell></row><row><cell>classification</cell><cell cols="2">hassecurity incident type SecurityIncident</cell></row><row><cell>date</cell><cell>has date</cell><cell>SecurityIncident</cell></row><row><cell>hour</cell><cell>has hour</cell><cell>SecurityIncident</cell></row><row><cell>source IP</cell><cell>hasip source</cell><cell>SecurityIncident</cell></row><row><cell>destination IP</cell><cell>hasip destination</cell><cell>SecurityIncident</cell></row><row><cell>reference</cell><cell>has reference</cell><cell>SecurityIncident</cell></row><row><cell>priority</cell><cell>has severity</cell><cell>SecurityIncident</cell></row><row><cell>source port</cell><cell>has sourceportnumber</cell><cell>Port</cell></row><row><cell cols="2">destination port has destinyportnumber</cell><cell>Port</cell></row><row><cell>protocol</cell><cell>hasprotocol name</cell><cell>Protocol</cell></row><row><cell>a</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>15, 2006?    (ii) Which security incidents were caused by a malicious code?</figDesc><table><row><cell>Prefix ab: &lt;http://a.com/SecurityIncidentOntology#&gt;</cell></row><row><cell>Select distinct ?incident ?date</cell></row><row><cell>Where { ?a ab:hassecurity_incident_type "Malicious Code";</cell></row><row><cell>ab:has_description ?incident;</cell></row><row><cell>ab:has_date ?date}</cell></row><row><cell>Prefix ab: &lt;http://a.com/SecurityIncidentOntology#&gt;</cell></row><row><cell>Select Distinct ?incident ?type</cell></row><row><cell>Where { ?x ab:has_date "2006-01-15";</cell></row><row><cell>ab:has_description ?incident;</cell></row><row><cell>ab:hassecurity_incident_type ?type} Order by ?x</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">http://www.cert.org/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">A security incident is "the act of violating an explicit or implied security policy", which is a CERT/CC definition.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">http://www.security.usp.br/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">World Wide Web Consortium.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_4">http://protege.stanford.edu/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_5">The relations precedes and proceeds are inverse, transitive, symmetric and reflexive.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_6">NVD is a searchable index of information on computer vulnerabilities and was known as ICAT Metabase. http://nvd.nist.gov/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_7">The label ontovul denotes this importing.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_8">http://www.snort.org/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="12" xml:id="foot_9">http://www.mysql.com/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="13" xml:id="foot_10">To perform previous tests with the knowledge base, it was stored firstly in a text file</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="14" xml:id="foot_11">Recursively, SPARQL Protocol and RDF Query Language. http://www.w3.org/TR/ rdf-sparql-query/.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target=":has_time&gt;11:11:38&lt;/j.0:has_time&gt;&lt;j.0:has_date&gt;2006-01-20&lt;/j.0:has_date&gt;&lt;j.0:hasip_source&gt;192.168.0.253&lt;/j.0:hasip_source&gt;&lt;j.0:hasip_destination&gt;192.168.0.18&lt;/j.0:hasip_destination&gt;&lt;j.0:has_severity&gt;Medium&lt;/j.0:has_severity&gt;&lt;j.0:has_reference&gt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0013" />
		<title level="m">Description rdf:nodeID=&quot;A5149</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="http://jena.sourceforge.net/" />
		<title level="m">Jena is an open-source Java framework for building Semantic Web applications</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">E</forename><surname>Mann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Christey</surname></persName>
		</author>
		<ptr target="http://cve.mitre.org" />
		<title level="m">Towards a common enumeration of vulnerabilities</title>
				<imprint>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Toward principles for the design of ontologies used for knowledge sharing</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">R</forename><surname>Gruber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">5/6</biblScope>
			<biblScope unit="page" from="907" to="928" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Ontology development 101: A guide to create your first ontology</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">F</forename><surname>Noy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Mcguiness</surname></persName>
		</author>
		<idno>TR KSL-01-05</idno>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
		<respStmt>
			<orgName>Knowledge Systems Laboratory -Stanford University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Ontologies: principles, methods and applications</title>
		<author>
			<persName><forename type="first">M</forename><surname>Uschold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gruninger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge Engineering Review</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="93" to="155" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Towards a security network incident ontology to ease the security knowledge management</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F M</forename><surname>Martimiano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J S</forename><surname>Brandão</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">S</forename><surname>Moreira</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third International Information and Telecommunication Techniques Symposium (I2TS2004)</title>
				<meeting>the Third International Information and Telecommunication Techniques Symposium (I2TS2004)</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="88" to="95" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">An owl-based security incident ontology</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F M</forename><surname>Martimiano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">S</forename><surname>Moreira</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Eighth International Protégé Conference</title>
				<meeting>the Eighth International Protégé Conference</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="43" to="44" />
		</imprint>
	</monogr>
	<note>Poster</note>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Uso de ontologia para classificação de vulnerabilidades em sistemas computacionais</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J S</forename><surname>Brandão</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
		<respStmt>
			<orgName>Instituto de Ciências Matemáticas e de Computação -ICMC, Universidade de São Paulo -USP, São Carlos -São Paulo</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Master&apos;s thesis</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Computer Security</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gollmann</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>John Wiley &amp; Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">A common language for computer security incidents</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Howard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">A</forename><surname>Longstaff</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1998">1998</date>
		</imprint>
		<respStmt>
			<orgName>Sandia National Laboratories</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Ontology in information security: A useful theoretical foundation and methodology tool</title>
		<author>
			<persName><forename type="first">V</forename><surname>Raskin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">F</forename><surname>Hempelmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">E</forename><surname>Triezenberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nirenburg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Workshop on New Security Paradigms</title>
				<meeting>the Workshop on New Security Paradigms</meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Toward a security core ontology</title>
		<author>
			<persName><forename type="first">M</forename><surname>Schumacher</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Security Engineering with Patterns -Origins, Theoretical Model and New Applications</title>
		<title level="s">Lectures Notes in Computer Science</title>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2003">2003. 2754</date>
			<biblScope unit="page" from="87" to="96" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Methontology: From ontological art towards ontological engineering</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Fernández</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gómez-Pérez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Juristo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the AAAI Spring Symposium Series</title>
				<meeting>the AAAI Spring Symposium Series</meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="33" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m">IEEE: IEEE standard for developing software life cycle processes</title>
				<imprint>
			<publisher>IEEE Computing Society</publisher>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Gómez-Pérez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Juristo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Montes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pazos</surname></persName>
		</author>
		<title level="m">Ingeniería del conocimiento: Diseño y construcción de sistemas expertos</title>
				<meeting><address><addrLine>Ceura, Madri, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Overview of methodologies for building ontologies</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>López</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI99) -Workshop on Ontologies and Problem-Solving Methods: Lessons Learned and Future Trends</title>
				<meeting>the International Joint Conference on Artificial Intelligence (IJCAI99) -Workshop on Ontologies and Problem-Solving Methods: Lessons Learned and Future Trends</meeting>
		<imprint>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<idno>NCSC-TG-004</idno>
		<title level="m">NCSC: Glossary of computer security terms</title>
				<imprint>
			<date type="published" when="1988">1988</date>
		</imprint>
		<respStmt>
			<orgName>National Computer Security Center -Trusted Network</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Shirey</surname></persName>
		</author>
		<title level="m">RFC 2828: Internet security glossary</title>
				<imprint>
			<publisher>GTE-BBN Technologies</publisher>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">OWL web ontology language reference</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bechhofer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">V</forename><surname>Harmelen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hendler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Mcguinness</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">F</forename><surname>Patel-Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Stein</surname></persName>
		</author>
		<ptr target="http://www.w3.org/TR/owl-ref/" />
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">RDF vocabulary description language 1.0: RDFSchema</title>
		<author>
			<persName><forename type="first">D</forename><surname>Brickley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">V</forename><surname>Guha</surname></persName>
		</author>
		<ptr target="http://www.w3.org/TR/rdf-schema/" />
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A survey of ontology evaluation techniques</title>
		<author>
			<persName><forename type="first">J</forename><surname>Brank</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Grobelnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mladeniae</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Conference on Data Mining and Data Warehouses (SiKDD05)</title>
				<meeting>the Conference on Data Mining and Data Warehouses (SiKDD05)</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A task-based approach for ontology evaluation</title>
		<author>
			<persName><forename type="first">R</forename><surname>Porzel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Malaka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Workshop on Ontology Learning and Population (ECAI2004) -Sixteenth European Conference on Artificial Intelligence</title>
				<meeting>the Workshop on Ontology Learning and Population (ECAI2004) -Sixteenth European Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="9" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Measuring similarity between ontologies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Maedche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Staab</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceeding of the Thirteenth European Conference on Knowledge Acquisition and Management (EKAW02)</title>
				<meeting>eeding of the Thirteenth European Conference on Knowledge Acquisition and Management (EKAW02)</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="251" to="263" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Data driven ontology evaluation</title>
		<author>
			<persName><forename type="first">C</forename><surname>Brewster</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Alani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Dasmahapatra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wilks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Language Resources and Evaluation</title>
				<meeting>the International Conference on Language Resources and Evaluation</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Ontokhoj: A semantic web portal for ontology searching, ranking and classification</title>
		<author>
			<persName><forename type="first">P</forename><surname>Chintan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kaustubh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yugyung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">K</forename><surname>Park</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Fifth ACM International Workshop on Web Information and Data Management</title>
				<meeting>the Fifth ACM International Workshop on Web Information and Data Management</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="58" to="61" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Ontometric: A method to choose the appropriate ontology</title>
		<author>
			<persName><forename type="first">A</forename><surname>Lozano-Tello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gómez-Pérez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Database Management</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1" to="18" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Ontologies</title>
		<author>
			<persName><forename type="first">W</forename><surname>Swartout</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tate</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Intelligent Systems</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="18" to="19" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
