IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v16y2024i3p69-d1343688.html
   My bibliography  Save this article

An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications

Author

Listed:
  • Davy Preuveneers

    (DistriNet, KU Leuven, Celestijnenlaan 200A, B-3001 Leuven, Belgium)

  • Wouter Joosen

    (DistriNet, KU Leuven, Celestijnenlaan 200A, B-3001 Leuven, Belgium)

Abstract

Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously modeling the complex relationships between various cybersecurity concepts and properties. Leveraging this knowledge, they provide a foundation for designing more intelligent and adaptive cybersecurity systems. In this work, we propose an ontology-based cybersecurity framework that extends well-known cybersecurity ontologies to specifically model and manage threats imposed on applications, systems, and services that rely on artificial intelligence (AI). More specifically, our efforts focus on documenting prevalent machine learning (ML) threats and countermeasures, including the mechanisms by which emerging attacks circumvent existing defenses as well as the arms race between them. In the ever-expanding AI threat landscape, the goal of this work is to systematically formalize a body of knowledge intended to complement existing taxonomies and threat-modeling approaches of applications empowered by AI and to facilitate their automated assessment by leveraging enhanced reasoning capabilities.

Suggested Citation

  • Davy Preuveneers & Wouter Joosen, 2024. "An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications," Future Internet, MDPI, vol. 16(3), pages 1-23, February.
  • Handle: RePEc:gam:jftint:v:16:y:2024:i:3:p:69-:d:1343688
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/16/3/69/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/16/3/69/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:16:y:2024:i:3:p:69-:d:1343688. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.