<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Representing cyberspace with the Basic Formal Ontology*</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giacomo De Colle</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Center for Ontological Research</institution>
          ,
          <addr-line>Buffalo, NY</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University at Buffalo</institution>
          ,
          <addr-line>Buffalo, NY</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Building a comprehensive ontological representation of cyberspace allows for integration of cyberspace data with data coming from other sources. This would prove extremely valuable, for example by integrating cybersecurity data with other intelligence and security data. In this paper I briefly present a simple pattern for representing cyberspace entities using the Basic Formal Ontology. The pattern makes use of the three-fold distinction between the information bearer, the information content and the specifically dependent continuant concretizing the information content.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Domain ontologies</kwd>
        <kwd>cyberspace</kwd>
        <kwd>Basic Formal Ontology</kwd>
        <kwd>Common Core Ontologies</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The Basic Formal Ontology (BFO) has emerged as a standard top-level ontology architecture
and is currently employed in multiple initiatives for the purposes of data sharing and
interoperability [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. BFO has been extended by multiple ontology projects in different areas,
including for example the biomedical field [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], occupations [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], documents and information [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
the military domain [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], intelligence [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], industry [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], and social entities [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Moreover, the
Common Core Ontologies (CCO) have recently emerged as a mid-level architecture widely
adopted in the defense and intelligence community [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>The domain of information processing and computation nevertheless remains a complex
domain to represent ontologically. More specifically cyberspace, provisionally understood as
the aggregate composed of computing artifacts, the information they process and the
connections between such artifacts, is the object of interest for this paper. Ontologically
representing cyberspace allows for integration of data about cyberspace itself with data about
other parts of reality – for example, watchlist data or geographical location data. This would
allow for implementation of ontologies in different computer science fields, starting from
cybersecurity, and be of crucial support for big data analysis in intelligence operations.</p>
      <p>
        Foundational studies in the ontology of cyberspace were already introduced in the BFO
community [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], while more recently the CCO community has developed the Cyber ontology,
which is currently part of an IEEE initiative, to represent cyberspace and the entities inhabiting
it [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. The aim of this short paper is to introduce a general, high-level pattern for the
representation of information sharing and modification in the BFO and CCO community.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Concretization relations in BFO</title>
      <p>The representation of information processing through BFO stands on the threefold distinction
of information, information bearer and the qualities or dispositions of the bearer which
concretize the information content. Take first as an example the familiar case of a book and the
information stored in it. The book itself is a material entity, which acts as information bearer,
and is represented in CCO by the class “Information Bearing Entity” (IBE). The pattern of ink
on the book is instead a quality of the book, which allows it to convey information. The pattern
of ink is, in BFO terms, a specifically dependent continuant, given that it requires the continued
existence of this specific instance of book in order to remain in existence. The corresponding
CCO class is called Information Quality Entity (IQE).</p>
      <p>Finally, the information itself is the content of the book. The latter entity is, in BFO terms, a
generically dependent continuant: it can continue to exist as long at least one entity is
structured in such a way that it carries the information in question. This means that different
copies of the same book can carry the same, numerically identical, information content, despite
the copies and the ink patterns being different from one another. The corresponding CCO class
is called Information Content Entity (ICE).</p>
      <p>Notice that the link between the generically dependent continuant (the information) and the
material entity (the information bearer) is given by the presence of the qualities of the material
entity. The relation between the generically dependent continuant and the qualities is called a
relation of concretization. The generically dependent continuant in question can only be
interacted with by modifying the qualities and dispositions of a certain material entity. For
example, changing the pattern of ink on a piece of paper makes it such that the pattern of ink
on the piece of paper is now concretizing a different information content.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Modelling cyberspace in BFO – a test case</title>
      <p>We can provisionally consider cyberspace as the aggregate of multiple computing artifacts and
the information stored in and exchanged by these computing artifacts. The processes taking
place in cyberspace are then mostly processes of information processing and sharing. An
ontological representation of cyberspace will then make use of material entities (computing
artifacts), ICEs (the information stored in the devices) and the patterns of qualities and
dispositions which concretize these ICEs.</p>
      <p>Image 1 shows a simplified model of a cyber-attack known as active packet sniffing. In one
such attack, a malicious actor intercepts a data packet which is being transmitted over a
network, reads the information in the packet, and changes it by inserting malicious code in the
data packet. The ontological model of this process represents the process of active packet
sniffing as modifying the quality pattern that concretizes the information content of the data
packet. This information content is non-malicious at t1, and is replaced by malicious
information at t3, after the process of modification has taken place at t2. The quality is borne
by a data packet bearer, which in this case could be a part of a disk of a server. The quality itself
could be identified with the pattern of electromagnetic energy that is stored on the disk.</p>
      <p>The precision at which the material entity and quality are represented nevertheless doesn’t
need to be as detailed as the one discussed above. Unless the ontology in question is used, say,
in the realm of industry manufacturing of computer hardware, we can represent bearers and
their qualities at a higher level of granularity. For example, we can consider the whole server
as data packet bearer, and we can introduce corresponding qualities identified by the type of
information they are concretizing. In the case shown in figure 1, the quality concretizing data
packet information is simply called a data packet quality.</p>
      <p>The threefold distinction introduced in BFO and extended in CCO has great representational
power, insofar as it allows for the ontologist adopting it to represent different sides of the
entities involved in information processing. Clearly, the full extent of the threefold distinction
doesn’t need to be employed in all situations. For example, in some cases it might be sufficient
to say that a malicious actor is trying to access or modify the information (ICE) stored on a
certain device. Nevertheless, BFO and CCO allow for a more fine-grained distinction which can
be used to model tampering of code, direct modification of information stored on a specific
hardware, as well as tracking detailed provenance of information, and information about the
specific place and time where a certain cyber-attack has taken place.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>BFO and CCO offer a well-developed and stable pattern which can be used to ontologically
represent information processing, copying and sharing, as well as related operations in
cyberspace. Adopting these top- and mid-level ontological layers provides a starting semantic
layer which will be extremely useful in bridging data coming from different sources for
interoperability of cybersecurity data.
The author wishes to acknowledge the insightful discussions with John Beverley, the members
of the 2024 Ontology Engineering and Intelligence Analysis seminar at the University at Buffalo,
and the members of the Cyber Ontology IEEE group.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] ISO/IEC 21838-1:
          <year>2021</year>
          . “Information Technology -
          <string-name>
            <surname>Top-Level Ontologies</surname>
          </string-name>
          (TLO)
          <article-title>- Part 1: Requirements</article-title>
          .”
          <source>Accessed Feb 19</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Arp</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spear</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Building Ontologies with Basic Formal Ontology</article-title>
          , MIT Press,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ashburner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosse</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bard</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bug</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ceusters</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldberg</surname>
            ,
            <given-names>L. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eilbeck</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ireland</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mungall</surname>
            ,
            <given-names>C. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leontis</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rocca-Serra</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruttenberg</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sansone</surname>
            ,
            <given-names>S.-A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scheuermann</surname>
            ,
            <given-names>R. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shah</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Whetzel</surname>
            ,
            <given-names>P. L.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>S. “</given-names>
          </string-name>
          <article-title>The OBO Foundry: Coordinated evolution of ontologies to support biomedical data integration”</article-title>
          .
          <source>Nature Biotechnology</source>
          , (
          <year>2007</year>
          ),
          <volume>25</volume>
          (
          <issue>11</issue>
          ),
          <fpage>1251</fpage>
          -
          <lpage>1255</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Beverley</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duncan</surname>
          </string-name>
          , W.D.,
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Judkins</surname>
            ,
            <given-names>J.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hogan</surname>
            ,
            <given-names>W.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGill</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dooley</surname>
            ,
            <given-names>D.M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>He</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          “
          <article-title>The Occupation Ontology (OccO): Building a Bridge between Global Occupational Standards”</article-title>
          .
          <source>Proceedings International Workshop on Ontologies for Services and Society, July 17-20</source>
          , (
          <year>2023</year>
          ), Sherbrooke, Canada
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Smith</given-names>
            <surname>Barry</surname>
          </string-name>
          , Ceusters Werner. “Aboutness:
          <article-title>Towards Foundations for the Information Artifact Ontology”</article-title>
          .
          <source>In Proceedings of the Sixth International Conference on Biomedical Ontology (ICBO)</source>
          , (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Morosoff</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rudnicki</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Farrell</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          “
          <article-title>Joint Doctrine Ontology: A Benchmark for Military Information Systems Interoperability”</article-title>
          .
          <source>Semantic Technologies for Intelligence</source>
          , Defense, and Security, (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Mandrick</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          “
          <article-title>Philosophical foundations of intelligence collection and analysis: a defense of ontological realism”</article-title>
          .
          <source>Intelligence and National Security</source>
          ,
          <volume>37</volume>
          , (
          <year>2022</year>
          ):
          <fpage>809</fpage>
          -
          <lpage>819</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Drobnjakovic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kulvatunyou</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ameri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Will</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , “
          <article-title>The Industrial Ontologies Foundry (IOF) Core Ontology, Formal Ontologies Meet Industry (FOMI)”</article-title>
          . Tarbes,
          <string-name>
            <surname>FR</surname>
          </string-name>
          , [online],
          <year>2022</year>
          . https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=
          <volume>935068</volume>
          (
          <issue>Accessed February 17</issue>
          ,
          <year>2024</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Hicks</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hanna</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Welch</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brochhausen</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hogan</surname>
            <given-names>WR</given-names>
          </string-name>
          . “
          <article-title>The ontology of medically related social entities: recent developments”</article-title>
          .
          <source>Journal of Biomed Semantics</source>
          , (
          <year>2016</year>
          )
          <article-title>Jul 12;7:47</article-title>
          . doi:
          <volume>10</volume>
          .1186/s13326-016-0087-
          <fpage>8</fpage>
          . PMID: 27406187; PMCID:
          <fpage>PMC4942889</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>[10] CUBRC. white Paper-"An Overview of the Common Core Ontologies”</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Koepsell</surname>
            <given-names>D. R.</given-names>
          </string-name>
          ,
          <source>“The Ontology of Cyberspace”</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Donohue</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jensen</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cox</surname>
            <given-names>A. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rudnicki</surname>
            <given-names>R.</given-names>
          </string-name>
          , “
          <article-title>A common core-based cyber ontology in support of cross-domain situational awareness</article-title>
          .” Defense + Security (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>IEEE</given-names>
            <surname>Cyber Ontology Working Group</surname>
          </string-name>
          ,
          <article-title>"Cyber Ontology Releases," IEEE Open Source</article-title>
          . [Online]. Available: https://opensource.ieee.org/cyber-ontology-working-group/cyberontology-releases.
          <source>[Accessed 25 February</source>
          <year>2024</year>
          ].
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>