scholarly journals Multi-Source Knowledge Reasoning for Data-Driven IoT Security

Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7579
Author(s):  
Shuqin Zhang ◽  
Guangyao Bai ◽  
Hong Li ◽  
Peipei Liu ◽  
Minzhi Zhang ◽  
...  

Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation awareness and threat assessment difficult. In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links. In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO), to describe the elements of IoT security threats and design inference rules for threat analysis. This IoTSTO expands the current knowledge domain of cyber security ontology modeling. In the IoTSTO model, the proposed multi-source knowledge reasoning method can perform the following tasks: assess the threats of the IoT environment, automatically infer mitigations, and separate IoT nodes that are subject to specific threats. The method above provides support to security managers in their deployment of security solutions. This paper completes the association of current public knowledge bases for IoT security and solves the semantic heterogeneity of multi-source knowledge. In this paper, we reveal the scope of public knowledge bases and their interrelationships through the multi-source knowledge reasoning method for IoT security. In conclusion, the paper provides a unified, extensible, and reusable method for IoT security analysis and decision making.

2020 ◽  
Vol 3 (2) ◽  
pp. 113-117
Author(s):  
Seyeon Jeong ◽  
Mingi Cho ◽  
Eunbi Hwang ◽  
Taekyoung Kwon

BMC Biology ◽  
2021 ◽  
Vol 19 (1) ◽  
Author(s):  
Andra Waagmeester ◽  
Egon L. Willighagen ◽  
Andrew I. Su ◽  
Martina Kutmon ◽  
Jose Emilio Labra Gayo ◽  
...  

Abstract Background Pandemics, even more than other medical problems, require swift integration of knowledge. When caused by a new virus, understanding the underlying biology may help finding solutions. In a setting where there are a large number of loosely related projects and initiatives, we need common ground, also known as a “commons.” Wikidata, a public knowledge graph aligned with Wikipedia, is such a commons and uses unique identifiers to link knowledge in other knowledge bases. However, Wikidata may not always have the right schema for the urgent questions. In this paper, we address this problem by showing how a data schema required for the integration can be modeled with entity schemas represented by Shape Expressions. Results As a telling example, we describe the process of aligning resources on the genomes and proteomes of the SARS-CoV-2 virus and related viruses as well as how Shape Expressions can be defined for Wikidata to model the knowledge, helping others studying the SARS-CoV-2 pandemic. How this model can be used to make data between various resources interoperable is demonstrated by integrating data from NCBI (National Center for Biotechnology Information) Taxonomy, NCBI Genes, UniProt, and WikiPathways. Based on that model, a set of automated applications or bots were written for regular updates of these sources in Wikidata and added to a platform for automatically running these updates. Conclusions Although this workflow is developed and applied in the context of the COVID-19 pandemic, to demonstrate its broader applicability it was also applied to other human coronaviruses (MERS, SARS, human coronavirus NL63, human coronavirus 229E, human coronavirus HKU1, human coronavirus OC4).


Author(s):  
Hamad Al-Mohannadi ◽  
Irfan Awan ◽  
Jassim Al Hamar ◽  
Yousef Al Hamar ◽  
Mohammad Shah ◽  
...  

Author(s):  
Э.Д. Алисултанова ◽  
Л.К. Хаджиева ◽  
М.З. Исаева

Данная статья посвящена созданию профориентационной (умной) лаборатории, которая призвана сформировать у школьников базовые представления о технологии Интернет вещей (IoT), угрозах кибербезопасности в этой сфере, мотивировать к получению в будущем профильного образования и построению карьеры в области обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. Обучение школьников в профориентационной лаборатории, построенное на основе применения интерактивных электронных образовательных ресурсов, прежде всего будет позиционировать карьерные возможности будущих специалистов в сфере обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. В рамках функционирования лаборатории особое внимание обучающихся сконцентрировано на тематиках правовых аспектов обеспечения кибербезопасности, главных тенденциях развития киберугроз в современном глобальном информационном пространстве и мерах, необходимых для их нейтрализации. This article is devoted to the creation of a career-oriented (smart) laboratory, which is designed to formulate in schoolchildren basic ideas about the Internet of Things (IoT) technology, cyber security threats in this area, motivate to receive specialized education in the future and build a career in the field of Internet things (IoT) security) with the functioning of smart manufacturing. The training of schoolchildren in a vocational guidance laboratory, based on the use of interactive electronic educational resources, will primarily position the career opportunities of future specialists in the field of Internet of Things (IoT) security in the operation of smart manufacturing. Within the framework of the functioning of the laboratory, special attention of students is concentrated on the topics of the legal aspects of ensuring cyber security, the main trends in the development of cyber threats in the modern global information space and the measures necessary to neutralize them.


Author(s):  
TANJA KOVAČ KREMŽAR

Slovenska vojska poleg nacionalne obrambe opravlja naloge v mednarodnih operacijah in na misijah v zahtevnih podnebnih in geografskih razmerah zunaj območja držav članic Nata in EU. Zavezniške sile, ki opravljajo svoje poslanstvo na ozemljih zunaj Natovega območja, so lahko izpostavljene različnim dejavnikom tveganja, ki vplivajo na njihovo zdravje. Za njihovo ustrezno zdravstveno zaščito je treba sprejeti in izvajati učinkovit program, ki naj bo namenjen tako zdravstvenemu osebju kot poveljnikom. Strokovno zdravstveno osebje pridobiva zdravstvene podatke, na primer ocenjuje okoljske in zdravstvene vire ogrožanja, prepozna tveganja in izdela analizo groženj, ter jih vključuje v upravljanje tveganj. MEDINT ima pomembno vlogo v razmerju med zdravstvenim sistemom in krovno obveščevalno dejavnostjo, uporablja zakonitosti njenega obveščevalnega ciklusa, saj se na nekaterih stopnjah obveščevalni ciklus MEDINT vključuje v obveščevalni ciklus krovne obveščevalne dejavnosti. Končni obveščevalni proizvod MEDINT, ki temelji na oceni zdravstvene ogroženosti, podpira poveljnikov namen in operacijo. In addition to providing for national defence, the Slovenian Armed Forces perform tasks in demanding climatic and geographical conditions in international operations and missions outside the territory of NATO and EU Member States. Allied forces performing their mission in the territories outside the NATO area may be exposed to various threats that affect their health. For the protection of the forces` health, it is necessary to adopt and implement an effective program, which should be aimed, both, at healthcare personnel as well as commanders. Professional medical staff obtains medical data, assesses environmental and medical threats, identifies the risks, carries out threat analysis and implements them in risk management. Medical intelligence (MEDINT) plays an important role in the relation between the health system and intelligence activities. It also uses the intelligence cycle to ensure that all available information for making assessments is processed. To be fully efficient MEDINT requires the cooperation of experts from different natural science disciplines (medical, scientific or bio-engineering). The final MEDINT product based on the health threat assessment supports the commander’s intent and the operation as such.


Author(s):  
Cosmena Mahapatra

Recent attacks on Indian Bank customers have exposed the vulnerability of banking networks in India and the ignorance that prevails in the system. Unlike their foreign counterparts Indian banking networks are not aware of solutions easily available in market to counter cyber theft and cyber terrorism. SIEM or Security Information and Event Management is one such solution which could have easily negated these attacks. This chapter focuses on studying various cyber security mechanisms including SIEM for implementation of cyber defense effectively.


2018 ◽  
pp. 1299-1317
Author(s):  
Neila Rjaibi ◽  
Latifa Ben Arfa Rabai

This chapter presents the security concepts terminologies (threat, risk, security risk management, security risk management process, security threat model) and present the state of the art of security risk management models, compare and discuss strengths and weaknesses of such models. Then it presents the Mean Failure Cost (MFC) model for quantifying security threats as a rigorous measure of cyber security, and as a cascade of linear models in order to estimate the system security using the loss of a given stakeholders as a result of security breakdown. Finally it presents an overview of the applicability of the MFC measure to e-systems. In the conclusion, the chapter criticizes the MFC Cyber Security Measure and presents an overview of different perspectives.


Sign in / Sign up

Export Citation Format

Share Document