Ontology type: schema:Chapter
2014-05-14
AUTHORSNoor-ul-hassan Shirazi , Alberto Schaeffer-Filho , David Hutchison
ABSTRACTThere is no denying that communication networks, in particular the Internet, have changed our lives in many ways. Many organizations and businesses in general benefit, but at the same time their communication networks face many challenges such as cyber-attacks, which can result in disruptions of services and huge financial losses. Therefore, resilience of these networks against cyber-attacks is a growing interest in the cyber security community. In this paper, we propose a framework for attack pattern recognition by collecting and correlating cyber situational information vertically across protocol-levels, and horizontally along the end-to-end network path. This will help to analyze cyber challenges from different viewpoints and to develop effective countermeasures. More... »
PAGES125-134
Cyberpatterns
ISBN
978-3-319-04446-0
978-3-319-04447-7
http://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_10
DOIhttp://dx.doi.org/10.1007/978-3-319-04447-7_10
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1050127266
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Technology",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Communications Technologies",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "School of Computing and Communications, Lancaster University, Lancaster LA1 4WA, United Kingdom",
"id": "http://www.grid.ac/institutes/grid.9835.7",
"name": [
"School of Computing and Communications, Lancaster University, Lancaster LA1 4WA, United Kingdom"
],
"type": "Organization"
},
"familyName": "Shirazi",
"givenName": "Noor-ul-hassan",
"id": "sg:person.015637166311.49",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015637166311.49"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil",
"id": "http://www.grid.ac/institutes/grid.8532.c",
"name": [
"Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil"
],
"type": "Organization"
},
"familyName": "Schaeffer-Filho",
"givenName": "Alberto",
"id": "sg:person.016661106103.79",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016661106103.79"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "School of Computing and Communications, Lancaster University, Lancaster LA1 4WA, United Kingdom",
"id": "http://www.grid.ac/institutes/grid.9835.7",
"name": [
"School of Computing and Communications, Lancaster University, Lancaster LA1 4WA, United Kingdom"
],
"type": "Organization"
},
"familyName": "Hutchison",
"givenName": "David",
"id": "sg:person.012636622347.55",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012636622347.55"
],
"type": "Person"
}
],
"datePublished": "2014-05-14",
"datePublishedReg": "2014-05-14",
"description": "There is no denying that communication networks, in particular the Internet, have changed our lives in many ways. Many organizations and businesses in general benefit, but at the same time their communication networks face many challenges such as cyber-attacks, which can result in disruptions of services and huge financial losses. Therefore, resilience of these networks against cyber-attacks is a growing interest in the cyber security community. In this paper, we propose a framework for attack pattern recognition by collecting and correlating cyber situational information vertically across protocol-levels, and horizontally along the end-to-end network path. This will help to analyze cyber challenges from different viewpoints and to develop effective countermeasures.",
"editor": [
{
"familyName": "Blackwell",
"givenName": "Clive",
"type": "Person"
},
{
"familyName": "Zhu",
"givenName": "Hong",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-319-04447-7_10",
"inLanguage": "en",
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-319-04446-0",
"978-3-319-04447-7"
],
"name": "Cyberpatterns",
"type": "Book"
},
"keywords": [
"cyber attacks",
"pattern recognition",
"communication networks",
"cyber security community",
"cyber situational awareness",
"disruption of service",
"computer networks",
"huge financial losses",
"network paths",
"situational awareness",
"cyber challenges",
"situational information",
"security community",
"end network path",
"different viewpoints",
"network",
"financial losses",
"effective countermeasures",
"recognition",
"Internet",
"same time",
"challenges",
"general benefits",
"services",
"framework",
"countermeasures",
"business",
"information",
"path",
"viewpoint",
"way",
"organization",
"benefits",
"interest",
"resilience",
"time",
"awareness",
"community",
"end",
"life",
"loss",
"disruption",
"paper"
],
"name": "Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks",
"pagination": "125-134",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1050127266"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-319-04447-7_10"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-319-04447-7_10",
"https://app.dimensions.ai/details/publication/pub.1050127266"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:43",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_199.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-319-04447-7_10"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_10'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_10'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_10'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_10'
This table displays all metadata directly associated to this object as RDF triples.
125 TRIPLES
23 PREDICATES
68 URIs
61 LITERALS
7 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/978-3-319-04447-7_10 | schema:about | anzsrc-for:10 |
2 | ″ | ″ | anzsrc-for:1005 |
3 | ″ | schema:author | N54851ed1732440e0b828d15356455223 |
4 | ″ | schema:datePublished | 2014-05-14 |
5 | ″ | schema:datePublishedReg | 2014-05-14 |
6 | ″ | schema:description | There is no denying that communication networks, in particular the Internet, have changed our lives in many ways. Many organizations and businesses in general benefit, but at the same time their communication networks face many challenges such as cyber-attacks, which can result in disruptions of services and huge financial losses. Therefore, resilience of these networks against cyber-attacks is a growing interest in the cyber security community. In this paper, we propose a framework for attack pattern recognition by collecting and correlating cyber situational information vertically across protocol-levels, and horizontally along the end-to-end network path. This will help to analyze cyber challenges from different viewpoints and to develop effective countermeasures. |
7 | ″ | schema:editor | N9a65816f8f814e1f894475f16063ed42 |
8 | ″ | schema:genre | chapter |
9 | ″ | schema:inLanguage | en |
10 | ″ | schema:isAccessibleForFree | false |
11 | ″ | schema:isPartOf | N6842fbcc242a4328b333fd2a2e3bd78e |
12 | ″ | schema:keywords | Internet |
13 | ″ | ″ | awareness |
14 | ″ | ″ | benefits |
15 | ″ | ″ | business |
16 | ″ | ″ | challenges |
17 | ″ | ″ | communication networks |
18 | ″ | ″ | community |
19 | ″ | ″ | computer networks |
20 | ″ | ″ | countermeasures |
21 | ″ | ″ | cyber attacks |
22 | ″ | ″ | cyber challenges |
23 | ″ | ″ | cyber security community |
24 | ″ | ″ | cyber situational awareness |
25 | ″ | ″ | different viewpoints |
26 | ″ | ″ | disruption |
27 | ″ | ″ | disruption of service |
28 | ″ | ″ | effective countermeasures |
29 | ″ | ″ | end |
30 | ″ | ″ | end network path |
31 | ″ | ″ | financial losses |
32 | ″ | ″ | framework |
33 | ″ | ″ | general benefits |
34 | ″ | ″ | huge financial losses |
35 | ″ | ″ | information |
36 | ″ | ″ | interest |
37 | ″ | ″ | life |
38 | ″ | ″ | loss |
39 | ″ | ″ | network |
40 | ″ | ″ | network paths |
41 | ″ | ″ | organization |
42 | ″ | ″ | paper |
43 | ″ | ″ | path |
44 | ″ | ″ | pattern recognition |
45 | ″ | ″ | recognition |
46 | ″ | ″ | resilience |
47 | ″ | ″ | same time |
48 | ″ | ″ | security community |
49 | ″ | ″ | services |
50 | ″ | ″ | situational awareness |
51 | ″ | ″ | situational information |
52 | ″ | ″ | time |
53 | ″ | ″ | viewpoint |
54 | ″ | ″ | way |
55 | ″ | schema:name | Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks |
56 | ″ | schema:pagination | 125-134 |
57 | ″ | schema:productId | N113fb49a4b554290b0e7314ed26a0515 |
58 | ″ | ″ | N6f7395b268264d26b2a9c0bc7d839486 |
59 | ″ | schema:publisher | Nff18aa5523a2462f9c5fc297a2f53be5 |
60 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1050127266 |
61 | ″ | ″ | https://doi.org/10.1007/978-3-319-04447-7_10 |
62 | ″ | schema:sdDatePublished | 2022-05-20T07:43 |
63 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
64 | ″ | schema:sdPublisher | N203b61f862f542a0b6b52f2843769a98 |
65 | ″ | schema:url | https://doi.org/10.1007/978-3-319-04447-7_10 |
66 | ″ | sgo:license | sg:explorer/license/ |
67 | ″ | sgo:sdDataset | chapters |
68 | ″ | rdf:type | schema:Chapter |
69 | N113fb49a4b554290b0e7314ed26a0515 | schema:name | dimensions_id |
70 | ″ | schema:value | pub.1050127266 |
71 | ″ | rdf:type | schema:PropertyValue |
72 | N203b61f862f542a0b6b52f2843769a98 | schema:name | Springer Nature - SN SciGraph project |
73 | ″ | rdf:type | schema:Organization |
74 | N2ff80f5e6b3e47c6b2d0f59c9971c1e4 | rdf:first | sg:person.016661106103.79 |
75 | ″ | rdf:rest | N458754001e484d579302a056633cd7c5 |
76 | N458754001e484d579302a056633cd7c5 | rdf:first | sg:person.012636622347.55 |
77 | ″ | rdf:rest | rdf:nil |
78 | N53564d1dd37849ae86ecc9c26d98c584 | schema:familyName | Zhu |
79 | ″ | schema:givenName | Hong |
80 | ″ | rdf:type | schema:Person |
81 | N54851ed1732440e0b828d15356455223 | rdf:first | sg:person.015637166311.49 |
82 | ″ | rdf:rest | N2ff80f5e6b3e47c6b2d0f59c9971c1e4 |
83 | N6842fbcc242a4328b333fd2a2e3bd78e | schema:isbn | 978-3-319-04446-0 |
84 | ″ | ″ | 978-3-319-04447-7 |
85 | ″ | schema:name | Cyberpatterns |
86 | ″ | rdf:type | schema:Book |
87 | N6f7395b268264d26b2a9c0bc7d839486 | schema:name | doi |
88 | ″ | schema:value | 10.1007/978-3-319-04447-7_10 |
89 | ″ | rdf:type | schema:PropertyValue |
90 | N7174fcd8e8eb4a24ba6172053c55bdb2 | rdf:first | N53564d1dd37849ae86ecc9c26d98c584 |
91 | ″ | rdf:rest | rdf:nil |
92 | N8d479f67c02049ab8364e53385296f69 | schema:familyName | Blackwell |
93 | ″ | schema:givenName | Clive |
94 | ″ | rdf:type | schema:Person |
95 | N9a65816f8f814e1f894475f16063ed42 | rdf:first | N8d479f67c02049ab8364e53385296f69 |
96 | ″ | rdf:rest | N7174fcd8e8eb4a24ba6172053c55bdb2 |
97 | Nff18aa5523a2462f9c5fc297a2f53be5 | schema:name | Springer Nature |
98 | ″ | rdf:type | schema:Organisation |
99 | anzsrc-for:10 | schema:inDefinedTermSet | anzsrc-for: |
100 | ″ | schema:name | Technology |
101 | ″ | rdf:type | schema:DefinedTerm |
102 | anzsrc-for:1005 | schema:inDefinedTermSet | anzsrc-for: |
103 | ″ | schema:name | Communications Technologies |
104 | ″ | rdf:type | schema:DefinedTerm |
105 | sg:person.012636622347.55 | schema:affiliation | grid-institutes:grid.9835.7 |
106 | ″ | schema:familyName | Hutchison |
107 | ″ | schema:givenName | David |
108 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012636622347.55 |
109 | ″ | rdf:type | schema:Person |
110 | sg:person.015637166311.49 | schema:affiliation | grid-institutes:grid.9835.7 |
111 | ″ | schema:familyName | Shirazi |
112 | ″ | schema:givenName | Noor-ul-hassan |
113 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015637166311.49 |
114 | ″ | rdf:type | schema:Person |
115 | sg:person.016661106103.79 | schema:affiliation | grid-institutes:grid.8532.c |
116 | ″ | schema:familyName | Schaeffer-Filho |
117 | ″ | schema:givenName | Alberto |
118 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016661106103.79 |
119 | ″ | rdf:type | schema:Person |
120 | grid-institutes:grid.8532.c | schema:alternateName | Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil |
121 | ″ | schema:name | Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil |
122 | ″ | rdf:type | schema:Organization |
123 | grid-institutes:grid.9835.7 | schema:alternateName | School of Computing and Communications, Lancaster University, Lancaster LA1 4WA, United Kingdom |
124 | ″ | schema:name | School of Computing and Communications, Lancaster University, Lancaster LA1 4WA, United Kingdom |
125 | ″ | rdf:type | schema:Organization |