Skip to main content

Common Criteria Vulnerability Assessment Ontology

  • Conference paper
  • First Online:
Book cover Theory and Applications of Dependable Computer Systems (DepCoS-RELCOMEX 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1173))

Included in the following conference series:

  • 648 Accesses

Abstract

The paper concerns the Common Criteria Evaluation Methodology (CEM) and is focused on the knowledge engineering application for vulnerability assessment. To enable automation of this complex process, better structurization of evaluation activities and data is required. The main finding of the paper is the development of ontology-based data models to be applied in the knowledgebase of a tool supporting the Common Criteria Vulnerability Assessment. The ontology use is exemplified on the vulnerability analysis of a simple firewall. The readers should have basic knowledge about Common Criteria and the ontology development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Common Criteria for IT Security Evaluation. part 1-3, version 3.1 rev. 5 (2017)

    Google Scholar 

  2. CC Portal. https://www.commoncriteriaportal.org/. Accessed 09 Jan 2020

  3. Common Methodology for IT Security Evaluation. version 3.1 rev. 5 (2017)

    Google Scholar 

  4. Hermann, D.S.: Using the Common Criteria for IT Security Evaluation. CRC Press, Boca Raton (2003)

    Google Scholar 

  5. Higaki, W.H.: Successful Common Criteria Evaluation. A Practical Guide for Vendors, Copyright 2010 by Wesley Hisao Higaki, Lexington, KY (2011)

    Google Scholar 

  6. Bialas, A.: Common criteria related security design patterns for intelligent sensors—knowledge engineering-based implementation. Sensors 11, 8085–8114 (2011)

    Article  Google Scholar 

  7. Bialas, A.: Common criteria IT security evaluation methodology – an ontological approach. In: Zamojski, W., et al. (eds.) Advances in Intelligent Systems and Computing, vol. 761, pp. 23–34. Springer, Cham (2019)

    Google Scholar 

  8. Chang, S-C., Fan, C-F.: Construction of an ontology-based common criteria review tool. Proc. of the International Computer Symposium (ICS 2010), IEEE Xplore (2010)

    Google Scholar 

  9. Ekelhart, A., et al.: Ontological mapping of common criteria’s security assurance requirements. In: Venter, H., et al. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments, pp. 85–95. Springer, Boston (2007)

    Chapter  Google Scholar 

  10. CCMODE. http://commoncriteria.pl/index.php/en/. Accessed 09 Jan 2020

  11. de Franco Rosa, F., Jino, M.: A survey of security assessment ontologies. In: Rocha, Á., et al. (eds.) Recent Advances in Information Systems and Technologies. WorldCIST 2017. AISC, vol. 569. Springer, Cham (2017)

    Chapter  Google Scholar 

  12. Białas, A.: Ontology based model of the common criteria evaluation evidences. Theoret. Appl. Inform. 25(2), 69–92 (2013)

    MathSciNet  Google Scholar 

  13. Musen, M.A.: The Protégé project: A look back and a look forward. AI Matters 1(4), 4–12 (2015). Association of Computing Machinery Specific Interest Group in Artif. Intelligence

    Article  Google Scholar 

  14. Protégé, https://protege.stanford.edu/. Accessed 21 Nov 2016

  15. Bialas, A.: Software support of the common criteria vulnerability assessment. In: Zamojski, W., et al. (eds.) Advances in Intelligent Systems and Computing, vol. 582, pp. 26–38. Springer, Cham (2017)

    Google Scholar 

  16. Booth, H., Turner, Ch.: Vulnerability Description Ontology (VDO). Draft NISTIR 8138, NIST, Gaithersburg (2016)

    Google Scholar 

  17. CWE, CVE. http://cwe.mitre.org/. Accessed 08 Jan 2020

  18. NVD. https://nvd.nist.gov/general. Accessed 07 Jan 2020

  19. CPE. https://nvd.nist.gov/products/cpe/search. Accessed 05 Jan 2020

  20. CAPEC. https://capec.mitre.org/. Accessed 03 Jan 2020

  21. OWASP. https://www.owasp.org/index.php/Category:Vulnerability. Accessed 03 Jan 2020

  22. CVSS. https://www.first.org/cvss/specification-document. Accessed 05 Jan 2020

  23. Bialas, A.: Vulnerability assessment of sensor systems. Sensors 19, 2518. https://www.mdpi.com/1424-8220/19/11/2518. Accessed 05 Jan 2020

    Article  Google Scholar 

Download references

Acknowledgements

1. This work was supported by the Polish National Centre for Research and Development within the programme CyberSecIdent. Grant No. 381282/II/NCBR/2018.

2. This work was conducted using the Protégé resource, which is supported by grant GM10331601 from the National Institute of General Medical Sciences of the United States National Institutes of Health.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrzej Bialas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bialas, A. (2020). Common Criteria Vulnerability Assessment Ontology. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Applications of Dependable Computer Systems. DepCoS-RELCOMEX 2020. Advances in Intelligent Systems and Computing, vol 1173. Springer, Cham. https://doi.org/10.1007/978-3-030-48256-5_7

Download citation

Publish with us

Policies and ethics