A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment
Links to Fileshttp://iral.cs.umbc.edu/Pubs/CycSecure.pdf
MetadataShow full item record
Type of Work6 PAGES
conference papers and proceedings preprints
Citation of Original PublicationBlake Shepard, Cynthia Matuszek, C. Bruce Fraser, William Wechtenhiser, David Crabbe, Zelal Gundordu, John Jantos, Todd Hughes, Larry Lefkowitz, Michael Witbrock, Doug Lenat, Erik Larson, A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment, 17th Innovative Applications of Artificial Intelligence Conference (IAAI), Pittsburgh, Pennsylvania, July 2005.
RightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please contact the author.
Subjectsnetwork risk assessment
Cyc® knowledge base (KB)
analyses of the security of networks.
Interactive Robotics and Language Lab
CycSecureTM is a network risk assessment and network monitoring application that relies on knowledge-based artificial intelligence technologies to improve on traditional network vulnerability assessment. CycSecure integrates public reports of software faults from online databases, data gathered automatically from computers on a network and hand-ontologized information about computers and computer networks. This information is stored in the Cyc® knowledge base (KB) and reasoned about by the Cyc inference engine and planner to provide detailed analyses of the security (and vulnerability) of networks.
Showing items related by title, author, creator and subject.
Lee, Sookyoung (2010-01-01)Wireless sensor networks (WSNs) have recently received increasing attention due to a growing list of applications. Most notable among the applications are those in harsh environments, such as coast and border protection, ...
Exploiting Architectural Techniques for Boosting Base Station Anonymity in Wireless Sensor Networks Ren, Zhong (2011-01-01)Wireless Sensor Networks (WSNs) can be deployed to serve mission-critical applications in hostile environments such as battlefield and territorial borders. In these setups, the WSN may be subject to attacks in order to ...
Virtual Circuit Provisioning in Challenged Sensor Internetworks, With Application to the Solar System Internet Birrane, Edward J., III (2014-01-01)Platform heterogeneity, propagation delays, and link disruptions limit the scalability of sensing internetworking architectures. I present a challenged sensor internetwork (CSI) architecture that federates networks behind ...