Protecting digital assets using an ontology based cyber situational awareness system

IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and...

Full description

Saved in:
Bibliographic Details
Main Authors: Tariq Ammar Almoabady, Yasser Mohammad Alblawi, Ahmad Emad Albalawi, Majed M. Aborokbah, S. Manimurugan, Ahmed Aljuhani, Hussain Aldawood, P. Karthikeyan
Format: Article
Language:English
Published: Frontiers Media S.A. 2025-01-01
Series:Frontiers in Artificial Intelligence
Subjects:
Online Access:https://www.frontiersin.org/articles/10.3389/frai.2024.1394363/full
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841552011742412800
author Tariq Ammar Almoabady
Yasser Mohammad Alblawi
Ahmad Emad Albalawi
Majed M. Aborokbah
S. Manimurugan
Ahmed Aljuhani
Hussain Aldawood
P. Karthikeyan
author_facet Tariq Ammar Almoabady
Yasser Mohammad Alblawi
Ahmad Emad Albalawi
Majed M. Aborokbah
S. Manimurugan
Ahmed Aljuhani
Hussain Aldawood
P. Karthikeyan
author_sort Tariq Ammar Almoabady
collection DOAJ
description IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.MethodsThe proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.ResultsThe proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model’s effectiveness in proactive anomaly detection and cyber situational awareness enhancement.DiscussionThe integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach.
format Article
id doaj-art-bdcf8495862f4fea9c16b847edafcb93
institution Kabale University
issn 2624-8212
language English
publishDate 2025-01-01
publisher Frontiers Media S.A.
record_format Article
series Frontiers in Artificial Intelligence
spelling doaj-art-bdcf8495862f4fea9c16b847edafcb932025-01-09T13:43:14ZengFrontiers Media S.A.Frontiers in Artificial Intelligence2624-82122025-01-01710.3389/frai.2024.13943631394363Protecting digital assets using an ontology based cyber situational awareness systemTariq Ammar Almoabady0Yasser Mohammad Alblawi1Ahmad Emad Albalawi2Majed M. Aborokbah3S. Manimurugan4Ahmed Aljuhani5Hussain Aldawood6P. Karthikeyan7Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaFaculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaFaculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaFaculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaFaculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaFaculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaNEOM, Tabuk, Saudi ArabiaRV University, Bengaluru, IndiaIntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.MethodsThe proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.ResultsThe proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model’s effectiveness in proactive anomaly detection and cyber situational awareness enhancement.DiscussionThe integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach.https://www.frontiersin.org/articles/10.3389/frai.2024.1394363/fullanomaly detectioncyber situational awarenessstructured threat information expressionisolation forest algorithmauto encoder
spellingShingle Tariq Ammar Almoabady
Yasser Mohammad Alblawi
Ahmad Emad Albalawi
Majed M. Aborokbah
S. Manimurugan
Ahmed Aljuhani
Hussain Aldawood
P. Karthikeyan
Protecting digital assets using an ontology based cyber situational awareness system
Frontiers in Artificial Intelligence
anomaly detection
cyber situational awareness
structured threat information expression
isolation forest algorithm
auto encoder
title Protecting digital assets using an ontology based cyber situational awareness system
title_full Protecting digital assets using an ontology based cyber situational awareness system
title_fullStr Protecting digital assets using an ontology based cyber situational awareness system
title_full_unstemmed Protecting digital assets using an ontology based cyber situational awareness system
title_short Protecting digital assets using an ontology based cyber situational awareness system
title_sort protecting digital assets using an ontology based cyber situational awareness system
topic anomaly detection
cyber situational awareness
structured threat information expression
isolation forest algorithm
auto encoder
url https://www.frontiersin.org/articles/10.3389/frai.2024.1394363/full
work_keys_str_mv AT tariqammaralmoabady protectingdigitalassetsusinganontologybasedcybersituationalawarenesssystem
AT yassermohammadalblawi protectingdigitalassetsusinganontologybasedcybersituationalawarenesssystem
AT ahmademadalbalawi protectingdigitalassetsusinganontologybasedcybersituationalawarenesssystem
AT majedmaborokbah protectingdigitalassetsusinganontologybasedcybersituationalawarenesssystem
AT smanimurugan protectingdigitalassetsusinganontologybasedcybersituationalawarenesssystem
AT ahmedaljuhani protectingdigitalassetsusinganontologybasedcybersituationalawarenesssystem
AT hussainaldawood protectingdigitalassetsusinganontologybasedcybersituationalawarenesssystem
AT pkarthikeyan protectingdigitalassetsusinganontologybasedcybersituationalawarenesssystem