Ontology and Cyber Security
May 18th 2013
Bill Mandrick, PhD Senior Ontologist
Ontology and Cyber Security May 18 th 2013 Bill Mandrick, PhD - - PowerPoint PPT Presentation
Ontology and Cyber Security May 18 th 2013 Bill Mandrick, PhD Senior Ontologist 2 2/12/2013 AGENDA Ontology of Computer Network Operations DoD and USG Efforts Cyber Fast Track Computer Network Operations (CNO) Computer
Bill Mandrick, PhD Senior Ontologist
Data Tactics Proprietary 2/12/2013
2
4/18/2013 3
4/18/2013 4
4/18/2013 5
Commanders use the operations process to drive the conceptual and detailed planning necessary to understand, visualize, and describe their unique operational environment; make and articulate decisions; and direct, lead, and assess military operations.
Data Tactics Proprietary 2/12/2013
7
Data Tactics Proprietary 2/12/2013
8
8
Coordinated (Massing) Artillery Fires (1910-1940) Dowding Radar System (1940 Battle of Britain)
1800’s Cartographic Revolution
9
4/18/2013 10
4/18/2013 11
4/18/2013 12
4/18/2013 13
4/18/2013 14
4/18/2013 15
4/18/2013 17
4/18/2013 18
4/18/2013 19
4/18/2013 20
4/18/2013 21
Timestamp Internet Protocol Address Destination Computer Role CNI Event Signature CNI Event Signature Description CNI Detection Report Computer Network Intrusion (CNI) Event Source Computer Role produces describes has_part has_part designates designates designates Trojan Horse Virus facilitates has_part
CNI Detection Sensor
detects
4/18/2013 22
Data Tactics Proprietary 2/12/2013
23
SME Feedback
24
Ontology Review
Data Tactics Proprietary 2/12/2013
25
25
Data Tactics Proprietary 2/12/2013
26
Data Tactics Proprietary 2/12/2013
27