<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ontology for Cybersecurity Governance of ICT Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Fabio De Rosa</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nicolò Maunero</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca Nicoletti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paolo Prinetto</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martina Trussoni</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Agenzia per la Cybersicurezza Nazionale</institution>
          ,
          <addr-line>15 Via S. Susanna, 00187, Roma</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Cybersecurity National Laboratory, Consorzio Interuniversitario Nazionale per l'Informatica</institution>
          ,
          <addr-line>25 Via Ariosto, Roma, 00185</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>IMT Scuola Alti Studi Lucca</institution>
          ,
          <addr-line>19 Piazza S. Francesco, Lucca, 55100</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>ITASEC'22: Italian Conference on Cybersecurity</institution>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Politecnico di Torino</institution>
          ,
          <addr-line>24 Corso Duca Degli Abruzzi, Torino, 10129</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Considering the continuous growth in the complexity of both information systems and security information, it becomes more and more necessary to provide solutions that facilitate the user in the management and use of these large and complex knowledge-bases. In the last years we have seen the birth of more and more examples that propose ontologies, semantically rich descriptions of entities and relations for the management of security information. The aim of this work is to provide an ontology that (i) supports a formal description of an ICT system, (ii) relates it to its potential vulnerabilities, possible attack vectors, and available mitigations, (iii) allows inferring a tight relationship between IT/OT assets and their vulnerabilities. Given the description of the ICT system, the ontology is automatically populated with security information items obtained by querying external knowledge bases (e.g., CWE, CVE, MITRE ATT&amp;CK) and then providing the user with the necessary information to support operations such as Vulnerability Assessment and Penetration Testing and countermeasure planning.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Knowledge-base</kwd>
        <kwd>Cybersecurity</kwd>
        <kwd>Ontology</kwd>
        <kwd>Governance</kwd>
        <kwd>Vulnerability</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Recent years have seen a continuous increase in cyber attacks, accentuated even more by the
COVID-19 pandemic and the associated remote working[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Targets of attacks are the most
disparate, from the single individual to large companies and public organizations, contributing
to an annual cost, in terms of damage, of several billion (i.e., Wannacry alone resulted in costing
companies more than $4 billion[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]). Therefore, it is becoming of crucial importance to put in
place adequate defences to tackle an ever-evolving world.
      </p>
      <p>
        Given the steady increase in cybercrime, governments in various countries have been
prioritizing and strengthening investment plans to improve the security posture of the country’s
infrastructures, with particular emphasis on critical infrastructures. Notable examples are the
2017 executive order of the USA[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and the European Union’s NIS Directive[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], released in 2016
and its update (namely NIS 2) currently under review.
      </p>
      <p>The need to guarantee predetermined levels of security and the constant growth of systems
and digital infrastructures complexity makes it necessary, hence, to adopt technological solutions
to support the management and governance of this information; security teams need to manage
and correlate security data (i.e., vulnerability) and the infrastructure under analysis composition
to identify vulnerable points and plan countermeasures.</p>
      <p>
        In the last decade, ontologies have taken hold as means for the representation and semantically
rich description, in terms of entities - relations, of complex knowledge-bases, especially, in
the context of cybersecurity[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The use of an ontology allows a better categorization and,
consequently, reasoning on the possessed data, as well as to represent and consider also the
relations, explicit or implicit, between them[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]; the use of available reasoners[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] allows the
identification of dependencies and non-explicit links between data in the knowledge-base,
identifiable only after the population of the same.
      </p>
      <p>The present paper presents a tool, based on the use of an ontology, for: (i) the identification
of vulnerabilities in a system, (ii) the description of possible attack vectors for their exploitation,
and (iii) the presentation of possible available mitigations.</p>
      <p>To populate the ontology, security information is gathered by interacting with external
knowledge-bases, such as CVE1, NVD2 and MITRE ATT&amp;CK3. Once the ontology model is
complete it is possible to reason over data, manually or automatically, to infer complex information
about the infrastructure security; possible thanks to the tight relation between assets and their
security information represented in the ontology.</p>
      <p>The remainder of this paper is structured as follows. Section 2 provides an overview of the
state of the art and related works, as well as information on the starting point of this work.
Section 3 presents this work contribution, detailing the ontology and the solution developed.
Section 4 depicts some use cases, while section 5 draws some conclusions and presents possible
future works.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>
        The term Ontology has become commonly used in the field of computer science and engineering
when talking about knowledge representation. An ontology is a formal description of a set of
concepts belonging to the same domain. These concepts are clustered into classes and, for each
class, the hierarchical relations linking it to the others (superclass - subclass) are established.
The features and attributes of the diferent classes are called properties, the objects of the class
are called individuals or instances and for each class the range of values that its instances can
take is defined[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In this way, a knowledge-base of the domain of interest is created.
1https://cve.mitre.org
2https://nvd.nist.gov
3https://attack.mitre.org
      </p>
      <sec id="sec-2-1">
        <title>2.1. ICT Ontology</title>
        <p>With the Decree Law of 18 May 2018, n. 65, published on the Gazzetta Uficiale n. 132 of 9
June 2018, Italy implemented the NIS Directive to define the measures necessary to achieve a
high level of security of networks and information systems. The establishment of the Italian
Perimetro di Sicurezza Nazionale Cibernetica (PSNC) takes place within the framework of the
NIS Directive. The PSNC was established under Article 1, comma 1, of DPCM No. 105 of 21
September 2019, converted with amendments by Law No. 133 of 18 November 2019 (in the
Gazzetta Uficiale No. 272 of 20/11/2019) to ensure a high level of security of the networks,
information systems, and IT services of public administrations, public and private entities, and
operators having an ofice in the national territory, on which the exercise of essential State
functions depends.</p>
        <p>All of these entities, according to the Decree, are required to prepare and update, at least once
a year, a list of the networks, information systems, and IT services for which they are responsible,
including their architecture and components. They must, then, identify the ICT assets necessary
to perform the essential function or service, in order to assess the impact of an incident on the
ICT asset, in terms of its operability and of the compromise of data availability, integrity, or
confidentiality (CIA triad) and assess dependencies with other networks, information systems,
IT services or physical infrastructures of other entities. Finally, entities must identify the ICT
assets that, in the event of an incident, would cause total disruption of the essential function or
service.</p>
        <p>In order to manage ICT asset information, the Agenzia per la Cybersicurezza Nazionale (ACN)4
developed an Ontology, in the following referred to as ICT Ontology. It follows the guidelines
of the DPCM and it allows compliance with the law by describing in a structured manner all
the relevant components of the Essential Function and their relationships. In particular,
it describe the architecture of the infrastructure and the relationships with other entities and
external services.
• ICT Function: identifies the infrastructure supporting the delivery of the essential
function to be represented;
• Network: represents a network. Allows for the representation of the infrastructure
internal and external connections;
• IT Service: represents a service that the essential function provides or a service
provided by external entities on which the essential function relies;
• Resource: represents the resources composing the infrastructure. The entity is
characterized by several properties allowing for the description of software and hardware resources.
The picture shows some of them, including; (i) the product name, (ii) the software, or,
more in general, the product version, (iii) the Common Platform Enumeration (CPE), i.e.,
a standard naming scheme introduced by NIST5 for IT system, software, and hardware
products identification.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Related Work</title>
        <sec id="sec-2-2-1">
          <title>2.2.1. Cybersecurity Ontologies</title>
          <p>
            The Unified Cybersecurity Ontology (UCO) [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ] is an extension of Intrusion Detection System
(IDS) ontology[
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]; its objective is to bring forth a common and standard structure to describe
the cybersecurity domain. The main idea behind the project is to change the approach of the
cybersecurity standards from a syntactic representation to a more semantic one. A large number
of existing standards and ontologies have been studied and reviewed and the most common
ones have been selected to be integrated with UCO. In particular, UCO is intended to be the
semantic version of STIX [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] integrating references to available external standards, i.e., CVE,
CWE6, CAPEC7 and many others.
          </p>
          <p>UCO is at the moment the most comprehensive and exhaustive ontology for cybersecurity
related information and it has been mapped to all the most common publicly available ontologies,
but for the work presented in this paper one fundamental aspect is missing: the description of the
infrastructure. The focus of UCO is to give an overview of all general concepts in cybersecurity,
including possible attacks, attack patterns, means and consequences, but only very few classes
are dedicated to the description of the infrastructure.</p>
          <p>
            Another notable work proposing a cybersecurity ontology is the Internet Of Things Security
Ontology (IoTSec)[
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]. The goal of the authors is to provide a means to represent and analyse
information security information in the IoT field.
          </p>
          <p>IoTSec introduces the concepts of Asset and SecurityMechanism that were not present
in UCO and that help to outline an overview of an infrastructure. The project aimed at ensuring
that companies in the Internet of Things field use their devices in the most secure possible
way and at helping them to identify vulnerabilities and criticalities. Being IoT oriented, many
subclasses of Asset are very specific, but the underlying idea of being able to describe the
composition of the system in detail goes in the direction of the work presented in Section
2.1. The negative aspect of IoTSec is that the knowledge of the classes Vulnerability and
5https://nvd.nist.gov/products/cpe
6https://cwe.mitre.org/
7https://capec.mitre.org/
Threat is static: it is not designed to interact and comply with external sources and must be
managed and maintained directly when implementing the ontology.</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>2.2.2. Security Assessment Ontologies</title>
          <p>
            Considering previous works proposing the study, development, and use of ontologies for the
management of security information of a system while leveraging on the knowledge-base for
assessing the security and/or level of risk of a given infrastructure or system, the work of Rosa
et al. [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ] provides a good overview of major solutions available in the literature. More recent
examples include, instead, the work of Venkata et al.[
            <xref ref-type="bibr" rid="ref14">14</xref>
            ] which proposes a framework for
the security assessment of CPSs (Cyber Physical Systems). The proposed framework allows,
through the use of tools developed by the authors, to identify system vulnerabilities and possible
countermeasures. Security information and system data are loaded into the ontology designed to
allow the reasoning about the impact that a vulnerability may have on the represented scenario.
The proposed countermeasures are very simple and generic, i.e., patching the system, and are
taken from a set defined by the authors to support their solution. Aouad et al. propose in [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ]
an ontology to support the developed risk assessment methodology for a computer system. The
ontology in this case is used to organize the information necessary to carry out the operations
of cyber risk assessment and tries to describe the relationships between the system, a threat,
and the defensive measures currently in use.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Contribution</title>
      <p>This section presents the work done. The objective is to provide a tool to support security
operations that allows the analysis and management of related information:
• infrastructure composition in terms of assets, networks, functionality, and dependencies
with external entities;
• information on system vulnerabilities;
• information on attacks and mitigation.</p>
      <p>
        All this information items are organized in a semantically rich knowledge-base, built with
the support of an ontology. The ontology is composed of three main parts, linked together by
the relative relationships, which will be presented in more detail in the following sections:
• ICT Ontology: allows the description of the reference infrastructure;
• Vulnerability Ontology: contains and organizes data on the vulnerability of the
infrastructure. It is populated thanks to the interaction with external databases such as CVE,
NVD, and CWE;
• Attack Ontology: contains and organizes data on possible attacks, how a vulnerability
can be exploited, and possible mitigations. Populated using information coming from the
CWE and MITRE ATT&amp;CK databases[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>The ontology has been described using the OWL 2 language and resorting to Protégé, a tool
developed by Stanford University8.</p>
      <sec id="sec-3-1">
        <title>3.1. Improved ICT Ontology</title>
        <p>The ontology composition, and the main rationale behind it, has been already presented in
Section 2, but for this work, the available ontology has been slightly modified adding some
additional entities and relations as well as reorganizing the structure of some entities to better
represent the interaction with the rest of the ontology.</p>
        <p>The first modification introduced some new classes and a novel hierarchical organization
between some of the existing ones. In particular, some new concepts have been introduced,
including:
• Asset: it is a general concept that includes any information system, device, or data that
must be protected;
• SecurityProperty: it contains a set of individuals representing the main
security properties that an asset may require, namely AccessControl,
Accountability, Anonimity, Authentication, Authorization, Availability,
Confidentiality, Integrity, and NonRepudiation.
• SecurityMechanism: it is a general class that is modelled to contain all the possible
mechanisms put in place to protect assets.</p>
        <p>The Asset class is related to the SecurityMechanism class through the object property
hasSecurityMechanism. The SecurityMechanism class introduces some security
mechanisms that are important when assessing the security of an infrastructure. All the new
information are split into the following sub-classes:
• CryptographicConcept: it introduces in the ontology three key concepts of
cryptography that are DigitalSignature, HashFunction and KeyManagement.
• EncryptionAlgorithm: it specifies the algorithm used when encryption is performed.
• NetworkManagementSecurityMechanism: it allows to represent the
security mechanisms dedicated to networks. Its main sub-classes are
IntrusionPreventionSystem, IntrusionDetectionSystem, Proxy,
ReverseProxy, and ServerSecurityMechanism.
• SecurityPropertyMethod: it allows to represent security properties not
described by other classes. Its main subclasses are AccessControlMethod,
AuthenticationMethod and IntegrityMethod.</p>
        <p>• Protocol: it specifies the protocol, either secure or not, adopted.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Vulnerability Ontology</title>
        <p>As seen in Chapter 2, UCO and IoTSec use two diferent approaches for vulnerability
representation. The goal of this work is to provide a trade-of between the two, to allow a complete and
easily integrated solution.</p>
        <p>The idea is to add to the ICT Ontology the concept of vulnerability that the various assets
in the system may present; the class Vulnerability is put in relation with the classes Asset
and SecurityMechanism:
• Asset hasVulnerability Vulnerability;
• Vulnerability isVulnerabilityOf Asset;
• SecurityMechanism mitigates Vulnerability;
• Vulnerability isMitigatedBy SecurityMechanism.</p>
        <p>
          The class Vulnerability internally is composed of several sub-classes to describe its
characteristics and represent the link with the external vulnerability databases: this will allow
later to populate the ontology resorting to direct queries to these external knowledge-bases.
Modeling of the Vulnerability class follows the UCO approach[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]: a sub-class for each
external source is defined hierarchically organized, in particular the Vulnerability class is
modelled to accomodate the information available from CVE, CWE and NVD[
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Both CVE and
CWE are implemented as sub-classes of Vulnerability, in this way they inherit the existing
relationships of the class Vulnerability with the other classes in the ontology.
        </p>
        <p>The CVE class has the data property CVE_ID where the ID of the vulnerability can be stored
as a string; the CWE has an equivalent data property called CWE_ID. Both the classes have the
data property CVSS where the severity score of the vulnerability, if present, can be stored. In a
vulnerability assessment operation perspective this can be greatly beneficial to rank vulnerability
by their severity score and prioritize mitigation operation within the infrastructure. The new
schema of the ontology, highlighting the major addition, is depicted in Figure 2.</p>
        <p>As a result of these improvements, the ontology now includes dynamic security information.
Vulnerabilities can be added manually or automatically by scanning assets for known
vulnerabilities. The IDs of these vulnerabilities are then saved and all the necessary information to
represent actual relationships between vulnerabilities and infrastructure assets is derived from
external sources. Details on how carrying out this procedure will be provided in the sequel.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Attack Ontology</title>
        <p>Details and techniques used to perform penetration testing operations are out of the scope of this
work, but we aim at providing, thanks to the ontology developed, a tool to support these type
of operations. Given a vulnerability of the system the tool can provide guidelines on how the
vulnerability can be exploited by combining both technical information, such as those present in
CWE in the form of code snippets, and cyber intelligence information describing more broadly
how an attack can be carried out, the techniques used and so on, referring to the information
provided by MITRE ATT&amp;CK. In addition, the ontology also presents information on how a
vulnerability can be mitigated, again leveraging primarily on the two resources indicated above.</p>
        <p>To do this, the ontology Attack has been introduced and related to the other resources. It
is linked just to the Vulnerability class through the following properties Vulnerability
causes Attack and Attack exploits Vulnerability. Both these properties are linked
also to the class itself, since an attack can leverage on another attack.</p>
        <p>Moreover the Mitigation class is added, modelled to contain information about
possible mitigation of the given vulnerability and attack. This class is put in relation with the
Vulnerability class through the following properties: Vulnerability has Mitigation
and Mitigation mitigates Vulnerability.</p>
        <p>It is important to make a distinguo here: the classes Mitigation and SecurityMechanism
seem similar, at least in relation to the Vulnerability class, but they are thought to
accommodate and represent a diferent type of information:
• Mitigation: It is designed to be populated with information derived from vulnerabilities
in the system. These represent potential methods to mitigate a given vulnerability, but
which are not necessarily already implemented in the system.
• SecurityMechanism: It is designed to be populated when describing the infrastructure
represented and contains information regarding the technologies adopted, at the time of
compilation, in the system to secure it.</p>
        <p>The development of the Attack and Mitigation classes follows an approach similar to the
one used for the Vulnerability class, in fact, also these classes have been modeled starting
from the information they must contain available in the external knowledge-bases.</p>
        <p>
          Starting from the study of MITRE[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], the Attack ontology was modeled. In the work
of MITRE, CVE entries are mapped to corresponding intelligence information contained in
MITRE ATT&amp;CK; the analysis of the impact on a system of each vulnerability is split into three
steps: exploitation technique, primary impact, and secondary impact. Each of the steps refers
to a particular ATT&amp;CK technique, while the three steps represent the evolution of a possible
exploitation of the vulnerability.
        </p>
        <p>The Attack class is characterized by the following subclasses and relations:
• TechniqueID: represents the identifier of the corresponding technique in the MITRE
ATT&amp;CK database, internally the class also contains the reference to the sub techniques
related to it;
• TechniqueID has Technique: represents how an adversary can achieve its goal;
• Technique has sub-technique: represents the relation with all the sub-technique it
may have. Each sub-technique is characterized by its ID;
• CWEID: represents the identifier corresponding to the vulnerability in the CWE database;
• CWEID has Example: contains technical knowledge related to the CWEID entry. These
contain pieces of code that can allow the identification and exploitation of the vulnerability.</p>
        <p>The ontology includes also the class Mitigation, meant to be populated with the related
information contained in MITRE ATT&amp;CK and CWE. Therefore, it has been modeled accordingly:
• TechniqueID: represents the corresponding MITRE ATT&amp;CK technique;
• TechniqueID has PossibleMitigation: describes possible mitigations for the
particular technique;
• CWEID: represents the corresponding entry in the CWE database;
• CWEID has PossibleMitigation: describes possible mitigations for the particular</p>
        <p>CWE entry.</p>
        <p>The new additions to the ontology are summarized in Figure 2.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Bundle Everything Together</title>
        <p>Once the various pieces of the ontology have been completed and connected, all that remains is
to fill the model with the necessary information.</p>
        <p>Concerning the description of the infrastructure under analysis, this must be done manually
to include the highest possible level of detail. On the other hand, information on vulnerabilities,
attacks and countermeasures, are inserted in the ontology automatically thanks to available
tools and ad hoc developed solutions.</p>
        <p>For greater clarity, it is possible to distinguish two main phases that are carried out
chronologically one after the other: first, the part of the ontology related to the system vulnerabilities
is populated. The information entered within the ICT Ontology is used to query the
available vulnerability databases and the collected information is entered into the Vulnerability
Ontology. After this step, is then possible to query the CWE and MITRE ATT&amp;CK
knowledgebases to extract information regarding attacks and possible mitigation available, importing them
within the Attack Ontology. The population process of the Vulnerability Ontology
can be summarized in the following steps:
• If the CPE value of a product is available, then resorting to NVD can identify known
vulnerabilities and extract the corresponding CVEID, CWEID and, if available, CVSS scores.
• If the value of CPE is not available then the CVE database can be queried directly using the
product/vendor name and its version as the search key. In this case, the more details are
available on the product, the more the search can be targeted and less wide-ranging. Once
the entries of interest have been identified, the corresponding CVEID can be extracted
and the NVD database can be queried to extract CWEID and CVSS score, if present.</p>
        <p>
          Querying and interacting with the CVE database can be made more eficient by using the
cve-search9 tool, an open source project that consists of a local database that stores periodically
synchronized information from CVE and a set of APIs to query the same. This allows faster
queries and limits sending of sensitive information over the Internet. The interesting aspect is
that the results can be collected in the MongoDB10 format and through the use of another tool,
9https://www.cve-search.org/about/
10https://www.mongodb.com
M2Onto[
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], it is possible to translate the information contained in a MongoDB directly into an
ontology, after providing the tool with the ontological model to be filled.
        </p>
        <p>
          The population process, on the other hand, of the Attack Ontology can be summarized in
the following steps:
• Once the CVEIDs of all identified vulnerabilities are collected, resorting to the open source
tool attack_to_cve[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] it is possible to extract the possible attacks related to the specific
vulnerability. From here you can then extract the TechniqueID related to the attacks.
• Through the CWEID it is possible to query the corresponding database to extract the
information necessary to populate the ontology, namely the classes PossibleMitigation
and Example related to the corresponding CWEID.
• Through the TechniqueID identified above, it is possible to query the MITRE ATT&amp;CK
knowledge-base to extract the information needed to populate the ontology.
        </p>
        <p>Once this process is completed, a knowledge-base of security related to the reference
infrastructure is available to the user that can be used for security operations such as the identification
of vulnerabilities present, the operations that can be done to exploit these vulnerabilities and
related possible mitigations. In this particular case, the Protégé tool provides a convenient
interface to query the ontology, but an automatic process has also been developed to extract
the information collected and organize them in a report. Figure 3 outlines the overall scheme of
the proposed solution.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Solution Validation</title>
      <p>The proposed solution, for its validation, has been used in diferent application contexts, for
public and private operators identified as falling within the Perimetro Nazionale di Sicurezza
Cibernetica and not. For secrecy and confidentiality reasons, the names and results obtained
from the use of the system cannot be reported here.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and Future Works</title>
      <p>
        The paper presents the development of an ontology for the governance of data related to the
security of an IT infrastructure, which allows to relate information about assets with
vulnerabilities, attack vectors, and possible mitigations. Moreover, proprietary and non-proprietary
tools for the automatic population of the ontology have been presented. The result is a system
that allows the user to easily find and organize the information needed to plan operations
such as VAPT and mitigation implementations to the identified vulnerabilities. Possible future
developments, to improve the proposed solution, include:
• The use of tools to automate, at least partially, the population of the ontology related
to the ICT system. These tools could include, among the other, asset management and
discovery, and network scan tools.
• The integration into the ontology of the DFD (Data Flow Diagram) representation[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        This addition will allow, leveraging on the ontology, to perform system threats
modeling[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. It will then be possible to use the ontology to support all the steps of
Risk Assessment operations, from identification of threat to vulnerability assesment and
penetration testing.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Fortune</surname>
          </string-name>
          ,
          <article-title>There's a huge surge in hackers holding data for ransom, and experts want everyone to take these steps</article-title>
          , Available at https://fortune.com/
          <year>2022</year>
          /02/17/ ransomware-attacks-surge-2021
          <source>-report/, 2021. Accessed 20 April</source>
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Kaspersky</surname>
            , What is WannaCry ransomware?, Available at https://www.kaspersky.com/ resource-center/threats/ransomware-wannacry, ???? Accessed 20
            <given-names>April</given-names>
          </string-name>
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C. . I. S.</given-names>
            <surname>Agency</surname>
          </string-name>
          ,
          <article-title>Executive Order on Strengthening the Cybersecurity of Federal Networks</article-title>
          and
          <string-name>
            <given-names>Critical</given-names>
            <surname>Infrastructure</surname>
          </string-name>
          , Available at https://www.cisa.
          <article-title>gov/ executive-order-strengthening-cybersecurity-federal-networks-and-critical-</article-title>
          <string-name>
            <surname>infrastructure</surname>
          </string-name>
          ,
          <year>2017</year>
          . Accessed 20
          <string-name>
            <surname>April</surname>
          </string-name>
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Directive</surname>
          </string-name>
          <article-title>(eu) 2016/1148 of the european parliament and of the council of 6 july 2016 concerning measures for a high common level of security of network and information systems across the union</article-title>
          , Available at https://eur-lex.europa.eu/legal-content/EN/TXT/ ?uri=CELEX:32016L1148,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Aranovich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Katsy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ahmadnia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bishop</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Filkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sagae</surname>
          </string-name>
          ,
          <article-title>Beyond nvd: Cybersecurity meets the semantic web</article-title>
          .,
          <source>in: New Security Paradigms Workshop</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R. J.</given-names>
            <surname>DeStefano</surname>
          </string-name>
          , L. Tao,
          <string-name>
            <given-names>K.</given-names>
            <surname>Gai</surname>
          </string-name>
          ,
          <article-title>Improving data governance in large organizations through ontology and linked data</article-title>
          ,
          <source>in: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>279</fpage>
          -
          <lpage>284</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSCloud.
          <year>2016</year>
          .
          <volume>47</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Abburu</surname>
          </string-name>
          ,
          <article-title>A survey on ontology reasoners and comparison</article-title>
          ,
          <source>International Journal of Computer Applications</source>
          <volume>57</volume>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N. F.</given-names>
            <surname>Noy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. L.</given-names>
            <surname>McGuinness</surname>
          </string-name>
          , et al.,
          <article-title>Ontology development 101: A guide to creating your ifrst ontology</article-title>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Syed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Padia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mathews</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <article-title>Uco: A unified cybersecurity ontology</article-title>
          ,
          <source>in: Workshops at the thirtieth AAAI conference on artificial intelligence</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Undercofer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pinkston</surname>
          </string-name>
          , et al.,
          <article-title>A target-centric ontology for intrusion detection</article-title>
          ,
          <source>in: Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Barnum</surname>
          </string-name>
          ,
          <article-title>Standardizing cyber threat intelligence information with the structured threat information expression (stix</article-title>
          ),
          <source>Mitre Corporation</source>
          <volume>11</volume>
          (
          <year>2012</year>
          )
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Mozzaquatro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Agostinho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Goncalves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Martins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jardim-Goncalves</surname>
          </string-name>
          ,
          <article-title>An ontology-based cybersecurity framework for the internet of things</article-title>
          ,
          <source>Sensors</source>
          <volume>18</volume>
          (
          <year>2018</year>
          )
          <fpage>3053</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>F. d. Franco</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jino</surname>
          </string-name>
          ,
          <article-title>A survey of security assessment ontologies</article-title>
          ,
          <source>in: World Conference on Information Systems and Technologies</source>
          , Springer,
          <year>2017</year>
          , pp.
          <fpage>166</fpage>
          -
          <lpage>173</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R. Y.</given-names>
            <surname>Venkata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kamongi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kavi</surname>
          </string-name>
          ,
          <article-title>An ontology-driven framework for security and resiliency in cyber physical systems</article-title>
          ,
          <source>ICSEA</source>
          <year>2018</year>
          (
          <year>2018</year>
          )
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Aouad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Asghar</surname>
          </string-name>
          ,
          <article-title>Defender-centric conceptual cyber exposure ontology for adaptive cyber risk assessment</article-title>
          .,
          <source>in: ICETE (2)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>580</fpage>
          -
          <lpage>586</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B. E.</given-names>
            <surname>Strom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Applebaum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Nickels</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Pennington</surname>
          </string-name>
          , C. B. Thomas,
          <article-title>Mitre att&amp;ck: Design and philosophy</article-title>
          ,
          <source>Technical report</source>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ushakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Doynikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Novikova</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Kotenko</surname>
          </string-name>
          ,
          <article-title>Cpe and cve based technique for software security risk assessment</article-title>
          ,
          <source>in: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</source>
          , volume
          <volume>1</volume>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>353</fpage>
          -
          <lpage>356</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>MITRE</surname>
          </string-name>
          ,
          <article-title>Mapping mitre att&amp;ck® to cves for impact</article-title>
          , https://github.com/ center
          <article-title>-for-threat-informed-defense/attack</article-title>
          _to_cve,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Abbes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gargouri</surname>
          </string-name>
          ,
          <article-title>M2onto: an approach and a tool to learn owl ontology from mongodb database</article-title>
          ,
          <source>in: International Conference on Intelligent Systems Design and Applications</source>
          , Springer,
          <year>2016</year>
          , pp.
          <fpage>612</fpage>
          -
          <lpage>621</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-L.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Data flow diagram</article-title>
          ,
          <source>in: Modeling and Analysis of Enterprise and Information Systems</source>
          , Springer,
          <year>2009</year>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>97</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>OWASP</surname>
          </string-name>
          ,
          <article-title>Owasp ontology-driven threat modelling (odtm) framework</article-title>
          , https://github.com/ OWASP/OdTM,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>