24.11.2014 Views

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Knowledge in ontology is represented by:<br />

• classes - a general concepts;<br />

• properties of these concepts;<br />

• individuals - basic entities of concepts.<br />

Ontology can be created in OWL language, using Protégé<br />

application. There are many tools and software to support ontology<br />

functionalities. Knowledge enrichment can be improved<br />

by rules in SWRL (Semantic Web Rule Language) [11]. Rules<br />

in SWRL applied to OWL ontology give possibility to extend<br />

existing knowledge with new properties. This option enables<br />

individuals to be reclassified and makes process of filling-up<br />

properties of new individuals more automatic. Reasoning<br />

about ontology concepts can be provided by semantic reasoners.<br />

Relevant knowledge is also given by restrictions: relationships<br />

or constraints.<br />

Proposition of the ontology<br />

In this section our ontology approach with special consideration<br />

and emphasis on vulnerabilities is presented. Ontology<br />

has been created in OWL-DL language using Protégé 3.4. application.<br />

SCADA ontology aims at addressing the following key<br />

SCADA issues:<br />

• what are vulnerabilities of special SCADA components, architecture<br />

or protocols,<br />

• how these vulnerabilities affect SCADA resources,<br />

• which threats/attacks may occur and what damage they<br />

can cause?<br />

According to ISO/IEC 13335-1:2004 standard [8] vulnerabilities<br />

are considered as a part of network security system. In<br />

this approach SCADA resources, components have weak<br />

points named vulnerabilities. These vulnerabilities can be exploited<br />

by threats, leading to attacks. This security system is<br />

depicted into a form of classification with properties and relationships<br />

among security issues.<br />

Main concepts, which compose main classes of proposed<br />

ontology following ISO/IEC 13335-1:2004 standard are:<br />

• SCADA systems,<br />

• SCADA resources,<br />

• vulnerabilities,<br />

• threats and attacks,<br />

• source of attacks,<br />

• safeguards.<br />

The proposed hierarchy of ontology classes is presented<br />

in Fig. 1. These classes are connected properties. Properties<br />

show relations, dependence of one class on another or can<br />

represent some attributes. Main classes, named also superclasses<br />

have sub-classes. Sub-classes are specifications of<br />

super-classes and inherit their features.<br />

Going down the hierarchy, lower levels of subclasses<br />

make ontology information more detailed. Properties of “Vulnerabilities”<br />

class created in Protégé are presented in Fig. 2.<br />

Visualization of ontology with some relations between different<br />

classes is presented in Fig. 3. Subclasses of main<br />

classes are also shown there.<br />

Classification of key class of ontology - “Vulnerabilities”<br />

has been based on vulnerability description given in [12]. Thus<br />

SCADA vulnerabilities are grouped into five sub-classes of<br />

“Vulnerabilities” class in proposed ontology:<br />

• network Vulnerabilities,<br />

• platforms Vulnerabilities,<br />

• security and Administration Vulnerabilities,<br />

• data vulnerabilities,<br />

• architecture Vulnerabilities.<br />

These areas of vulnerabilities correspond with particular<br />

system components and can be connected with design, implementation,<br />

misconfiguration and procedural problems. Hi-<br />

Fig. 2. Properties of “Vulnerabilities” class created in Protégé<br />

Rys. 2. Właściwości klasy “Vulnerabilities” stworzone w aplikacji<br />

Protégé<br />

Fig. 3. Main classes visualized in Jambalaya plug-in<br />

Rys. 3. Główne klasy zwizualizowane w zakładce Jambalaya<br />

Fig. 1. Existing class hierarchy<br />

Rys. 1. Istniejąca hierarchia klas<br />

Fig. 4. Proposed vulnerabilities classification<br />

Rys. 4. Proponowana klasyfikacja podatności<br />

36 ELEKTRONIKA 11/<strong>2009</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!