IDEAS home Printed from
   My bibliography  Save this article

Using Ontologies in Cybersecurity Field


  • Tiberiu Marian GEORGESCU





This paper is an exploratory research which aims to improve the cybersecurity field by means of semantic web technologies. The authors present a framework which uses Semantic Web technologies to automatically extract and analyse text in natural language available online. The system provides results that are further analysed by cybersecurity experts to detect black hat hackers’ activities. The authors examine several characteristics of how hacking communities communicate and collaborate online and how much information can be obtained by analysing different types of internet text communication channels. Having online sources as input data, the model proposed extracts and analyses natural language that relates with cybersecurity field, with the aid of ontologies. The main objective is to generate information about possible black hat hacking actions, which later can be analysed punctually by experts. This paper describes the data flow of the framework and it proposes technological solutions so that the model can be applied. In their future work, the authors plan to implement the framework described as a system software application.

Suggested Citation

  • Tiberiu Marian GEORGESCU & Ion SMEUREANU, 2017. "Using Ontologies in Cybersecurity Field," Informatica Economica, Academy of Economic Studies - Bucharest, Romania, vol. 21(3), pages 5-15.
  • Handle: RePEc:aes:infoec:v:21:y:2017:i:3:p:5-15

    Download full text from publisher

    File URL:,%20georgescu.pdf
    Download Restriction: no

    References listed on IDEAS

    1. Andrew X. Li, 2015. "State-Society Synergy and Export Sophistication," Economics and Politics, Wiley Blackwell, vol. 27(3), pages 433-458, November.
    2. Marian STOICA & Bogdan GHILIC-MICU & Marinela MIRCEA & Cristian USCATU, 2016. "Analyzing Agile Development – from Waterfall Style to Scrumban," Informatica Economica, Academy of Economic Studies - Bucharest, Romania, vol. 20(4), pages 5-14.
    Full references (including those not matched with items on IDEAS)

    More about this item


    Cybersecurity; Ontologies; Semantic Web;


    Access and download statistics


    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aes:infoec:v:21:y:2017:i:3:p:5-15. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Paul Pocatilu). General contact details of provider: .

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service hosted by the Research Division of the Federal Reserve Bank of St. Louis . RePEc uses bibliographic data supplied by the respective publishers.