An Ontology Based Approach to Information Security - Semantic Scholar

10 downloads 10082 Views 208KB Size Report
tains the semantic concepts based on the information security standard .... electronic agents searching for information – this language is called Resource De-.
An Ontology Based Approach to Information Security Teresa Pereira1 and Henrique Santos2 1

Polytechnic Institute of Viana do Castelo Superior School of Business Studies Valen¸ca, Portugal 2 University of Minho School of Engineering Information System Department Guimar˜ aes, Portugal [email protected], [email protected] http://www.esce.ipvc.pt, http://www.dsi.uminho.pt

Abstract. The semantically structure of knowledge, based on ontology approaches have been increasingly adopted by several expertise from diverse domains. Recently ontologies have been moved from the philosophical and metaphysics disciplines to be used in the construction of models to describe a specific theory of a domain. The development and the use of ontologies promote the creation of a unique standard to represent concepts within a specific knowledge domain. In the scope of information security systems the use of an ontology to formalize and represent the concepts of security information challenge the mechanisms and techniques currently used. This paper intends to present a conceptual implementation model of an ontology defined in the security domain. The model presented contains the semantic concepts based on the information security standard ISO/IEC_JTC1, and their relationships to other concepts, defined in a subset of the information security domain. Keywords: Ontology, Information Security, Security Information Systems, Security Information Management.

1

Introduction

Tim Berners-Lee – the creator of the Web – considers ontologies to be a critical part of his latest work on the Semantic Web, envisioning the Semantic Web as being machine processable, leading to a better understanding of the content of Web pages by machines [1]. The proliferation of Web markup languages are supported by the growing needs of marking up information about the contents and services, instead of just presenting information. Assigning meaning to the ´ Sicilia, and N. Manouselis (Eds.): MTSR 2009, CCIS 46, pp. 183–192, 2009. F. Sartori, M.A. c Springer-Verlag Berlin Heidelberg 2009 !

184

T. Pereira and H. Santos

contents is actually the main concern of the information management experts. Further, ontologies have an important role to support browsing and search semantic contents, and in promoting interoperability for facilitation of knowledge management and configuration. The use of ontologies is not restricted to a specific domain. They practically are used to construct a model or a theory of a specific domain. In the context of information security the use of ontologies contribute to unify the terminology involved in classification and storage of security data. The tragic events of 09/11, as well as the ones that followed, forced many countries to review the efficiency and the efficacy of their information systems security [10]. The information management has become a main concern for the national security organizations, in addition to the interoperability between diverse information systems, in order to promote the exchange of security information. Actually, security organizations daily collect a large amount of data from different information sources, resulting in huge databases. On these databases an intensive analysis is performed, through the use of sophisticated data mining technologies with advanced statistical techniques to find important patterns, in order to be able to anticipate and prevent terrorist attacks [8]. However the results retrieved by data mining systems bring several questions regarding de false positives resulted from casual information associations, and meaningless positives. These errors can have potential negative side effects, for instance, leading innocent citizen to the confrontation of law enforcement services [2]. Actually the efficiency of the data mining technology used to foreseeing terrorism activities has not been proven in the academic literature [8]. The main problems are the amount, the heterogeneity and dynamic nature of data, and it becomes absolutely necessary to structure and organize it for knowledge retrieval. Actually, it is very difficult to incorporate knowledge or concepts abstracted from the low level data, into statistical analyses.The adoption of knowledge–based mechanisms seems to be an appropriate strategy in order to enable a better interpretation of data and therefore a better identification of the main features of information security threats and attacks. In this context, the knowledge organized according to the ontology under proposel, intends to help to organize and structure the terminology and concepts involved in this domain, based on the standards ISO/IEC_JTC1[5]. Furthermore, it enables a better interoperability among different security systems. In this paper we present an ontological semantic approach for information security and propose an implementation model of the ontology. The paper is struc-tured as follows: in the section 2 it will be presented an overview about information security and the associated technologies currently used to perform data analysis. In section 3 we briefly present related works based on an ontology approach, in the knowledge management area. In section 4 it is presented the ontological needs in information security. In section 5 it is presented the implementation model of the ontology, which contains the semantic concepts specified in the information security scope, and the relationships to other concepts. Lastly, some conclusions are presented in section 6.

An Ontology Based Approach to Information Security

2

185

Overview of Information Security

Over the past decades, governments were especially concerned with borders control and security, and with the illegal immigration. The terrorist attacks on September 11, 2001, as well as all disturb that followed, forced governments and the national security organizations, all over the world, to review the efficiency and the efficacy of their information systems security. The Schengen Information System (SIS) is an extensive database that stores information of millions of objects and individuals data that is shared by the 15 European countries, for different purposes [3]. Currently efforts have being developed to extend the SIS to the 25 Schengen countries. The contents collected and stored in the SIS are not exclusively used in Europe. Additional information systems such as those maintained by Eurodac and Europol collect and share information to control immigration and safeguarding security [3]. In fact the primarily use of SIS was to control illegal immigration. However, the dramatic proportions of the terrorist threats, have been promoting the discussion to extend the use of the SIS to different purposes, namely the establishment of a new Visa Information System and the use and storage of biometrical data. These databases store, in a daily bases, an extensive amount of information, becoming difficult to perform manually assess on these data. The analyses of these massive and complex data are extremely difficult. Among the efforts was considered the use of data mining to uncover plans of terrorist actions. Even though the key goal is to produce more accurate and useful information, in order to enable the appropriate analysis and interpretation of data, in a given context [6]. Some security specialists consider predictive data mining as counterproductive, in the scope of national security [6]. Although the use of data mining technologies has proven that they are well suited to certain endeavors, particularly in the area of consumer direct marketing, or for example to identify credit card frauds, which relies in models constructed using thousands of known examples of fraud per year, terrorism has no similar evidence [6]. In fact, terrorist incidents occur a couple of times per year and they are typically distinct in terms of planning and execution, becoming extremely difficult to get a meaningful pattern and therefore enabling the definition of a standard bad behavior, which indicates a plan or a preparation for a terrorism attack. Unlikely consumers shopping habits and financial fraud, terrorism attacks does not occur with enough frequency to enable the definition of valid predictive models. Moreover, the risks to privacy and other civil liberties concerns several communities and raise important issues, as the likelihood of the false positives [2]. Predictive data mining requires a considerably amount of data. The aggregation of all the required data in a central system introduces a number of significant problems, including the difficulty of protecting so much sensitive data from misuse. Predictive data mining usually provides a considered amount of information, but useful knowledge comes from the context. Therefore the use of ontology to semantically structure knowledge stored in the security information systems, introduces a new perspective to the data analysis previously presented, since the ontology enables the description of the semantics content of the data. Knowledge based methods, such as ontologies, includes the description

186

T. Pereira and H. Santos

of the semantics content of the data, promoting a proper data analyze and consequently improving the performance of the security information services. In the following sections it is presented the related work that use ontology structure to express security related information for different types of resources, as well an overview of ontologies, followed by the presentation of a proposed implementation model defined in the context of information security.

3

Ontology Based Applications in the Knowledge Management

The World Wide Web Consortium (W3C) is developing efforts in a language to encode knowledge on the Web pages, in order to make it understandable to electronic agents searching for information – this language is called Resource Description Framework (RDF). The Defense Advanced Research Projects Agency (DARPA) and W3C are working together in the development of a DARPA Agent Markup Language (DAML) by extending RDF with more expressive structure in order to promote agent interaction on the Web [9]. In several areas researchers are now trying to develop standardized ontologies towards a common objective: to share and annotate information in their knowledge fields. Some relevant examples are presented in the area of the Medicine. In this domain standardized and large structured vocabularies have been developed, such as SNOMED (http:// www.snomed.org/) and the semantic network of the United Medical Language System (UMLS – http://www.nlm.nih.gov/research/umls/). In public health domain several systems have been developed in order to detect disease-outbreak patterns and also with administrative and business purposes. One example is the billing and pharmaceutical sales records, collected for inventory and marketing purposes. Other example is the Realtime Outbreak and Disease Surveillance (RODS) project developed in the University of Pittsburgh to detect earlier outbreak of a disease. It is recognized the increase use of ontology based applications in the knowledge management of data analysis, in particularly in bioterrorism surveillance, in order to early detect and characterize an epidemic threat resulting from bioterrorism act. According to Buckeridge, an effective intervention depends on how quickly an epidemic can be detected, how well it can be characterized and how rapidly a response is initiated [4]. An experimental system named BioSTORM (Biological Spatio–Temporal Outbreak Reasoning Module) is a knowledge–based framework for real time epidemic surveillance [4]. In fact, the use of ontologies to model and annotate information and knowledge involved in syndrome and epidemic surveillance is the main feature of the BioSTORM system approach. Another relevant work is conducted by Raskin et al. [12]. They propose the use of natural language to define, in a unique way, the meaning of the main concepts about security incident information. Basically, two major components compose the ontology: a set of high–level incident related concepts and a method of classifying incident information [12]. Further they establish that the two components are related. The hierarchical representation of the concepts provides a structure that presents the concepts and their relations, improving the

An Ontology Based Approach to Information Security

187

ability to: (1) gather, organize and record incident information; (2) extract data from incident information; (3) promote incident information interoperability, enabling the sharing and comparison of incident information; (4) use of incident information to evaluate and decide on proper courses of action; (5) use incident information to determine effects of actions over time [12]. The items specified clearly present what an ontology for the domain of information security can do. Finally, the ontology developed by Moreira et al. [11], Ontologies for Information Security Management and Governance presents a vocabulary of concepts and relations to represent information related to security incidents, to be used and understood at higher levels, such as security governance tools and people. This ontology is distinct from the ontology proposed in this project and presented in this paper due to the fact that it uses the security standard ISO/IEC_JTCI1[5] to represent concepts and relations in the information security domain, presenting a new and different structure of the concepts and relationships between the concepts.

4

Ontological Needs in Information Security

The General Accounting Office (GAO) recommends the establishment of common metadata standards for electronic information as a strategy to integrate and manage homeland security functions, including new procedure for data sharing across government [8]. The definition of metadata standards in the scope of security information will support the integration of heterogeneous data collected, enabling a uniform analytic and interpretation process of the data resource. It is recognized the fact that the attackers are smarter in creating more sophisticated security attacks, especially distributed attacks. In order to detect and withstand such attacks, security information systems should collaborate and communicate with each other by sharing a common vocabulary. A vocabulary based on ontologies is a powerful solution to achieve the above goals. The ontology–based approach enable to define the security concepts and their dependencies in a comprehensible way to both humans and software agents. In fact the use of ontologies in the domain of security information management is just a proposal solution and needs further studies. However, the novelty of this solution regards the use of ontology to enhance the abstract metadata rich view on data semantics resources. In summary the reasons that support a proposal ontological approach in the scope of information security management are provided as follows: – Ontologies enable to specify semantic relationships between diverse concepts; – Ontologies share a common understanding of structured information among different parties such as humans or software agents, which enables to be reasoned and analyzed automatically; – Ontologies are reusable and able to evolve over time; – Ontologies are shared among different agents to solve interoperability problems.

188

T. Pereira and H. Santos

These reasons justify the popularity of the ontological approach has a theoretical foundation and has a methodological tool. In fact this is a new and an ambitious proposition in the information security domain in order to improve the current mechanisms used. Therefore we hope this topic generates discussion among the researcher community, in order to enrich and specify this view.

5

IS Ontology Conceptual Model

The architecture of the presented system has four layers: Data Resources, Conceptual Layer, Management Layer and Strategic Layer. The Data Resources Layer is composed of distributed data repositories, that contain security data provided by different and heterogeneous information sources, such as blogs, documents, reports of security events, et cetera. The data retrieved from the data resources will be mapped into the concepts of the ontology defined in the conceptual layer, enabling a better management of the security information, in the upper layer. The definition and adoption of a common terminology of the concepts, in the security information domain will help the security administrators to deal with security events more efficiently and therefore the implementation of security policies by the security information experts. Moreover, accurate information will promote the implementation of strategic security policies. The Figure 1 illustrates the information flow in the four layers, defined in the presented architecture. The methodology used to develop the proposed ontology was the one presented by Noy and McGuiness [9]. This methodology was used in order to provide the necessary knowledge to develop the conceptualization phase. The implementation model of the proposed ontology for information security presented in the figure 1 comprises a set of concepts and their relations involved in the area, which are derived from established standards ISO/IEC_JTC1[5]. After defining

Information Flow Security Policies Security Information Management

Strategic Layer

Management Layer

Ontology Conceptual Layer

Data Resources

Fig. 1. System Architecture (adapted from [7])

An Ontology Based Approach to Information Security

189

Reduce

Threat

Produce

Attack

Exploit

Vulnerability

Detect/Prevent/Block Has

Protect

Control

Impact Reduce

Fig. 2. Concepts and relationships of the Ontology

the concepts and the relationships to other concepts, the ontology for information security was formalized through the use of the W3C standard language for modeling ontologies Web Ontology Language (OWL). This web language has been developed by the Web Ontology Working Group as a part of the W3C Semantic Web Activity [13]. In spite of OWL has not been designed to specifically express security issues, it was selected because it is a W3C recommendation since February of 2004 and due to its expressiveness with superior machine interpretability. The OWL is build upon Resource Description Framework (RDF) and Resource Description Framework Schema (RDFS). In fact the OWL vocabulary is an extension of RDF and uses RDF/XML syntax. Formally, an ontology is a tangled hierarchy of concepts related with properties. Figure 2 presents the main concepts related to the information security domain and the relationships among them. In this ontology were defined 5 main concepts and seven relationships. These concepts are described as following: Threat – This concept represent the types of dangers against a given set of properties (security properties). Attack – This concept represent the security incidents caused by some agent. Impact – This concept represent the effects that a security incident can imply. Control – This concept represent the mechanisms used to reduce or avoid the effects of an incident or to protect a vulnerability. Vulnerability – This concept represent the weaknesses of the system. The rational behind the ontology is structured as following: a threat produce an attack that may has impact. Attacks exploit one or more vulnerabilities and require a method, the opportunity and a given set of tools. By other side, the implementation of controls mechanisms aim to reduce the impacts of an

190

T. Pereira and H. Santos

attack, aim to detect/prevent/block an attack, aim to protect vulnerabilities and to reduce threats. The threat concept was included because it is important to correlate different attacks. The correlation can, for instance, help to establish which attacks succeed a threat. In OWL description, the concepts correspond to classes and relations to properties. According to Smith et al., much of the power of ontologies comes from class–based reasoning [13]. In the proposed model the concepts defined such as threat, attack, impact, control and vulnerability, correspond to the root classes. Thus, the OWL representation of these classes is the following: The properties enable to assert general facts about the classes. The following OWL sample presents the relations defined for the attack class. The property has_impact is a relation between the class attack and the class impact, according to the model depicted in the Figure 2. The domain and range properties relate instances of the class attack to instances of class impact. The structure of the presented concepts and their relations is the preliminary developing of the implementation model. However it needs further analysis and studies to complete the proposed ontology for information security.

6

Conclusions and Future Work

The tragic terrorism attacks occurred and their proportions forced many national agencies and governments to review the procedures used to manage information

An Ontology Based Approach to Information Security

191

security. An astounding number of information security events is daily collected from distributed information sources, and stored. New approaches have being used to perform analysis on these data, such as Data Mining as well as sophisticated statistical techniques. However the efficiency of these techniques to predict attacks has been highly questionable, due to the fact that it is extremely difficult to establish a common pattern that fits a completely behavior, and because it can lead to false positives that can be generated and bringing potential negative side effects, for instance, leading innocent citizens to the confrontation of law enforcement services. The use of data mining systems for national security needs to be evaluated not only against the citizen privacy being subject of abuse, but also the likelihood of goal success. The ontology-based approach introduces a new perspective to model information in security domain. It allows the description of the data semantics in a machine-accessible way. In this paper we proposed an ontology–based approach to firm up and unify the concepts and terminology in the security information domain, based on the relevant ISO/IEC_JTC1 standards. Adopting ontological approach as a theoretical foundation and a methodological tool is a promising new solution on the information security domain, and should be discussed by the research community. The next steps of the ontology development process are: (1) completion of the proposed ontology, according to the points focused by the research community, (2) ontology evaluation, which includes the mapping security data into the ontology, and the development of the necessary applications to query and infer information security from this ontology.

References 1. Berners-Lee, T.: Semantic Web on XML. Presentation from XML (2000) 2. Anderson, S.R.: Total Information Awareness and Beyond. The Dangers of Using Data Mining Technology to Prevent Terrorism. Technical report, BORDC Bill of Rights Defense Committee (2007), http://www.bordc.org/threats/data-mining.pdf 3. Brouwer, E.: Data Surveillance and border control in the EU: Balancing efficiency and legal protection of third country nationals. Technical report (2005), http://www.libertysecurity.org/article289.html?var_ recherche=Data%20Surveillance ˜ 4. Buckeridge, D.L., Graham, J., OOConnor, M.J., Choy, M.K., Tu, S.W., Musen, M.A.: Knowledge-Based Bioterrorism Surveillance. In: AMIA Annual Symposium, San Antonio, TX (2002), http://bmir.stanford.edu/file_asset/index.php/1147/SMI-2002-0946.pdf 5. ISO/IEC FDIS 27001 Information technology – Security techniques – Information security management systems– Requirements, ISO copyright office. Geneva, Switzerland (2005) 6. Jonas, J., Harper, J.: Effective Counterterrorism and the Limited Role of Predictive Data Mining. Policy Analysis no 584, CATO Institute, December 11 (2006), http://www.cato.org/pub_display.php?pub_id=6784 7. Martimiano, L., Moreira, E.: The evaluation process of a computer security incident ontology. In: 2nd Workshop on Ontologies and their Applications (WONTO 2006), S˜ ao Paulo, Brazil (2006)

192

T. Pereira and H. Santos

8. Maxwell, T.A.: Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives. In: Proceedings of the 38th Hawaii International Conference on System Sciences, Hawaii (2005) 9. Noy, N.F., McGuinness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology. Technical Report SMI-2001-0880, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics (2001), http://www-ksl.stanford.edu/people/dlm/papers/ ontology-tutorial-noy-mcguinness-abstract.html 10. Miller, R.R.: Information Management in the Aftermath of 9/11. Communications of the ACM 45(9) (2002) 11. Moreira, E.S., Martimiano, L.A., Brand˜ ao, A.J.d.S., Bernardes, M.C.: Ontologies for information security management and governance. Information Management & Security 16(2), 150–165 (2008) 12. Raskin, V., Hempelmann, C.F., Triezenberg, K.E., Nirenburg, S.: Ontology in information security: a useful theoretical foundation and methodo-logical tool. In: Proceedings of the 2001 Workshop on New Security Paradigms. NSPW 2001, pp. 53–59. ACM, New York (2001) 13. Smith, M.K., Welty, C., McGuinness, D.L.: OWL Web Ontology Language Guide. W3C Recommendation February 10, 2004. Technical report, W3C (2004), http://www.w3.org/TR/owl-guide/