Ontology Based Security Threat Assessment and Mitigation for Cloud Systems Metadata
Metadata describes a digital item, providing (if known) such information as creator, publisher, contents, size, relationship to other resources, and more. Metadata may also contain "preservation" components that help us to maintain the integrity of digital files over time.
Title
- Main Title Ontology Based Security Threat Assessment and Mitigation for Cloud Systems
Creator
-
Author: Kamongi, PatrickCreator Type: Personal
Contributor
-
Chair: Kavi, KrishnaContributor Type: PersonalContributor Info: Major Professor
-
Committee Member: Gomathisankaran, MahadevanContributor Type: Personal
-
Committee Member: Fu, SongContributor Type: Personal
-
Committee Member: Takabi, HassanContributor Type: Personal
Publisher
-
Name: University of North TexasPlace of Publication: Denton, TexasAdditional Info: www.unt.edu
Date
- Creation: 2018-12
Language
- English
Description
- Content Description: A malicious actor often relies on security vulnerabilities of IT systems to launch a cyber attack. Most cloud services are supported by an orchestration of large and complex systems which are prone to vulnerabilities, making threat assessment very challenging. In this research, I developed formal and practical ontology-based techniques that enable automated evaluation of a cloud system's security threats. I use an architecture for threat assessment of cloud systems that leverages a dynamically generated ontology knowledge base. I created an ontology model and represented the components of a cloud system. These ontologies are designed for a set of domains that covers some cloud's aspects and information technology products' cyber threat data. The inputs to our architecture are the configurations of cloud assets and components specification (which encompass the desired assessment procedures) and the outputs are actionable threat assessment results. The focus of this work is on ways of enumerating, assessing, and mitigating emerging cyber security threats. A research toolkit system has been developed to evaluate our architecture. We expect our techniques to be leveraged by any cloud provider or consumer in closing the gap of identifying and remediating known or impending security threats facing their cloud's assets.
- Physical Description: xii, 155 pages
Subject
- Keyword: Ontology
- Keyword: Cybersecurity
- Keyword: Cloud Computing
- Keyword: Vulnerability
- Keyword: Ranking
- Keyword: Threat
- Keyword: Risk
- Keyword: Prediction
- Keyword: Assessment
- Keyword: Mitigation
- Keyword: Systems
- Library of Congress Subject Headings: Computer networks -- Security measures.
- Library of Congress Subject Headings: Computer security.
- Library of Congress Subject Headings: Cloud computing -- Security measures.
- Library of Congress Subject Headings: Ontologies (Information retrieval)
Collection
-
Name: UNT Theses and DissertationsCode: UNTETD
Institution
-
Name: UNT LibrariesCode: UNT
Rights
- Rights Access: public
- Rights Holder: Kamongi, Patrick
- Rights License: copyright
- Rights Statement: Copyright is held by the author, unless otherwise noted. All rights Reserved.
Resource Type
- Thesis or Dissertation
Format
- Text
Identifier
- Accession or Local Control No: submission_1428
- Archival Resource Key: ark:/67531/metadc1404576
Degree
- Degree Name: Doctor of Philosophy
- Degree Level: Doctoral
- Academic Department: Department of Computer Science and Engineering
- College: College of Engineering
- Degree Discipline: Computer Science and Engineering
- Degree Publication Type: disse
- Degree Grantor: University of North Texas
Note
- Embargo Note: The work will be published after approval.