Ontology

A Disinformation Attack Risk Awareness Framework: A Case Study on Incidents Collected by DISARM Foundation

Abstract:

The diversity of disinformation attack strategies highlights the need for a thorough analysis of their impacts and related risks. To deal with them, this paper proposes an ontology-based framework for building knowledge about disinformation incidents, bridging Itemset Mining and Situational Awareness. The framework incorporates a High-Risk Itemset Mining algorithm that combines the frequency and fuzzy utility of attack pattern itemsets, allowing for deeper insights into attack tactics and a better assessment of their associated risks. Experiments conducted using DISARM Foundation dataset demonstrate the framework’s potential to identify the most relevant attack patterns and quantify their associated risks.

Developing a Cyber Operations Computational Ontology

Abstract: 

Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted, and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors.

A Semantic Approach to Modelling of Cybersecurity Domain

Abstract: 

This paper addresses the issue of mastering the complex body of knowledge that is relevant for cybersecurity. The wide spectrum of threats and wide variety of resources are considered, and a semantic approach is proposed, as it seems not to be referred to very often in this context. The authors here examine how semantic technology may address the nature of this body of knowledge. Ultimately, the article seeks to enable sharing of security-related knowledge across separate sources of data concerning various entities, such as vulnerabilities and attack types, and also across communities of IT professionals, hackers, defence researchers, and others.

Collecting Open Source Intelligence via Tailored Information Delivery Systems

ABSTRACT

The Internet offers a plethora of freely available information for possible use in Open Source Intelligence (OSINT) operations.  However, along with this information come challenges in finding relevant information and overcoming information overload.  This paper presents the results of an ongoing research in a Tailored Information Delivery Services (TIDS) system that aids users in retrieving relevant information through various open intelligence sources.  The TIDS provides a semantics-based query constructor that operates in a “What You Get is What You Need (WYGIWYNTM)” fashion and builds ontology based information tagging, theme extractor, and contextual model.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com