Title :
Avoiding inconsistencies in the Security Content Automation Protocol
Author :
Fitzgerald, William M. ; Foley, Simon N.
Author_Institution :
Comput. Sci. Dept., Univ. Coll. Cork, Cork, Ireland
Abstract :
The Security Content Automation Protocol (SCAP) provides a standardized approach to specifying system configuration, vulnerability, patch and compliance management. SCAP comprises a family of existing standards, such as the Open Source Vulnerability Language (OVAL) and the Common Platform Enumeration (CPE). Defining new or extending existing SCAP content is non-trivial and potentially error-prone. For example, specifying a vulnerability in OVAL may appear straightforward, however, the challenge is to specify the vulnerability in such as way that it is consistent with respect to, not just other OVAl data, but also data described under any other standards in SCAP. This paper identifies a number of consistency problems that can occur in SCAP specifications and these are illustrated using examples from existing OVAL, CPE, CVE and CCE repositories. It is argued that an ontology-based approach can be used as a means of providing a uniform vocabulary for specifying SCAP data and its relationships. A SCAP ontology is developed based on Semantic Threat Graphs and it is argued that its use can help to ensure consistency across large-scale SCAP repositories.
Keywords :
automation; protocols; telecommunication security; SCAP content; common platform enumeration; compliance management; nontrivial; open source vulnerability language; patch management; potentially error-prone; security content automation protocol; semantic threat graphs; Computer crime; Linux; Ontologies; Routing; Semantics; Standards;
Conference_Titel :
Communications and Network Security (CNS), 2013 IEEE Conference on
Conference_Location :
National Harbor, MD
DOI :
10.1109/CNS.2013.6682760