SlideShare a Scribd company logo
1 of 18
Download to read offline
Ontology for
Describing
Security
Events
An
Assault with a Weapon (Ink Pen)
Incident Details:
On Monday November 03, 2014, at approximately 11:45 AM, Ryerson Security &
Emergency Services were made aware of the following incident:Approximately forty-
five minutes earlier, the victim, a Ryerson community member, was approached by the
subject on the 8th floor of the Ted Rogers School of Management (TRS) building, on the
north end of the east corridor, near to the escalators. The victim noticed ... The subject
then raised and swung his arm downward towards the victim with a pen in his hand...
The subject was last observed exiting the Ted Rogers School of Management (TRS)
building at approximately 11:05 PM and walking eastbound on the south sidewalk of
Dundas Street east. Ryerson University Security & Emergency Services conducted
safety planning with the victim and a patrol of the area, but did not locate a person
matching the subject’s description. The victim reported no physical injuries, declined
medical attention, and did not want Toronto Police Services involved at this time.
Suspect information: Male, Approximately 20-25
years of age, Light/fair complexion, Short black
hair in a brush cut, Wearing blue jeans, a dark-
green long-sleeved shirt, beige shoulder bag, black
running shoes with white soles, and eye glasses
Information Extraction from
Notifications
Transform to Security Incident
Ontology (SIO) Schema
Updating Data Mart
Virtuoso
Universal
Server
★Available on the web (whatever format) but with an open
license, to be Open Data
★★Available as machine-readable structured data (e.g. excel
instead of image scan of a table)
★★★non-proprietary format (e.g. CSV instead of excel)
★★★★Use open standards from W3C (RDF and SPARQL) to
identify things, so that people can point at your stuff
★★★★★Link your data to other people’s data to provide context
Ontology
http://semionet.rnet.ryerson.ca/ontologies/sio.owl
Virtuoso Endpoint
http://141.117.3.88:8890/sparql
Graph IRI
http://ls3.rnet.ryerson.ca/SecurityIncident/test
Train & Build a NER to Security Events Text
Improve the Quality of the SIO
- Provenance
- Anonymization
- Documentation
Register to LOD Cloud
ls3.rnet.ryerson.ca
Electrical & Computer Dept.
Ryerson University
Toronto
Canada
SEKE15: An ontology for describing security events
SEKE15: An ontology for describing security events
SEKE15: An ontology for describing security events
SEKE15: An ontology for describing security events
SEKE15: An ontology for describing security events
SEKE15: An ontology for describing security events
SEKE15: An ontology for describing security events
SEKE15: An ontology for describing security events

More Related Content

More from Hossein Fani

ECIR23: A Streaming Approach to Neural Team Formation Training
ECIR23: A Streaming Approach to Neural Team Formation TrainingECIR23: A Streaming Approach to Neural Team Formation Training
ECIR23: A Streaming Approach to Neural Team Formation TrainingHossein Fani
 
ECIR20: Temporal Latent Space Modeling for Community Prediction
ECIR20: Temporal Latent Space Modeling for Community PredictionECIR20: Temporal Latent Space Modeling for Community Prediction
ECIR20: Temporal Latent Space Modeling for Community PredictionHossein Fani
 
CIKM17: temporally like-minded user community identification through neural ...
CIKM17: temporally like-minded user community identification through  neural ...CIKM17: temporally like-minded user community identification through  neural ...
CIKM17: temporally like-minded user community identification through neural ...Hossein Fani
 
CIKM AnalytiCup 2017: Bagging Model for Product Title Quality with Noise
CIKM AnalytiCup 2017: Bagging Model for Product Title Quality with NoiseCIKM AnalytiCup 2017: Bagging Model for Product Title Quality with Noise
CIKM AnalytiCup 2017: Bagging Model for Product Title Quality with NoiseHossein Fani
 
WSDM16: Temporal Formation and Evolution of Online Communities
WSDM16: Temporal Formation and Evolution of Online CommunitiesWSDM16: Temporal Formation and Evolution of Online Communities
WSDM16: Temporal Formation and Evolution of Online CommunitiesHossein Fani
 
Latent Community Analysis: PhD Proposal
Latent Community Analysis: PhD ProposalLatent Community Analysis: PhD Proposal
Latent Community Analysis: PhD ProposalHossein Fani
 
Moviesion: Content-based Movie Recommender Fueled by Linked Open Data
Moviesion: Content-based Movie Recommender Fueled by Linked Open DataMoviesion: Content-based Movie Recommender Fueled by Linked Open Data
Moviesion: Content-based Movie Recommender Fueled by Linked Open DataHossein Fani
 
Exploratory Social Network Analysis with Pajek: Blockmodels
Exploratory Social Network Analysis with Pajek: BlockmodelsExploratory Social Network Analysis with Pajek: Blockmodels
Exploratory Social Network Analysis with Pajek: BlockmodelsHossein Fani
 
Exploratory Social Network Analysis: Ranking
Exploratory Social Network Analysis: RankingExploratory Social Network Analysis: Ranking
Exploratory Social Network Analysis: RankingHossein Fani
 
Exploratory Social Network Analysis with Pajek: Diffusion
Exploratory Social Network Analysis with Pajek: DiffusionExploratory Social Network Analysis with Pajek: Diffusion
Exploratory Social Network Analysis with Pajek: DiffusionHossein Fani
 
Exploratory Social Network Analysis with Pajek: Center & Periphery
Exploratory Social Network Analysis with Pajek: Center & PeripheryExploratory Social Network Analysis with Pajek: Center & Periphery
Exploratory Social Network Analysis with Pajek: Center & PeripheryHossein Fani
 
Exploratory Social Network Analysis with Pajek: Sentiments & Friendship
Exploratory Social Network Analysis with Pajek: Sentiments & FriendshipExploratory Social Network Analysis with Pajek: Sentiments & Friendship
Exploratory Social Network Analysis with Pajek: Sentiments & FriendshipHossein Fani
 
Exploratory Social Network Analysis with Pajek: Attributes & Relations
Exploratory Social Network Analysis with Pajek: Attributes & RelationsExploratory Social Network Analysis with Pajek: Attributes & Relations
Exploratory Social Network Analysis with Pajek: Attributes & RelationsHossein Fani
 
Ontology Engineering
Ontology EngineeringOntology Engineering
Ontology EngineeringHossein Fani
 
Philosophical Software Developing
Philosophical Software DevelopingPhilosophical Software Developing
Philosophical Software DevelopingHossein Fani
 

More from Hossein Fani (18)

ECIR23: A Streaming Approach to Neural Team Formation Training
ECIR23: A Streaming Approach to Neural Team Formation TrainingECIR23: A Streaming Approach to Neural Team Formation Training
ECIR23: A Streaming Approach to Neural Team Formation Training
 
ECIR20: Temporal Latent Space Modeling for Community Prediction
ECIR20: Temporal Latent Space Modeling for Community PredictionECIR20: Temporal Latent Space Modeling for Community Prediction
ECIR20: Temporal Latent Space Modeling for Community Prediction
 
CIKM17: temporally like-minded user community identification through neural ...
CIKM17: temporally like-minded user community identification through  neural ...CIKM17: temporally like-minded user community identification through  neural ...
CIKM17: temporally like-minded user community identification through neural ...
 
CIKM AnalytiCup 2017: Bagging Model for Product Title Quality with Noise
CIKM AnalytiCup 2017: Bagging Model for Product Title Quality with NoiseCIKM AnalytiCup 2017: Bagging Model for Product Title Quality with Noise
CIKM AnalytiCup 2017: Bagging Model for Product Title Quality with Noise
 
WSDM16: Temporal Formation and Evolution of Online Communities
WSDM16: Temporal Formation and Evolution of Online CommunitiesWSDM16: Temporal Formation and Evolution of Online Communities
WSDM16: Temporal Formation and Evolution of Online Communities
 
Latent Community Analysis: PhD Proposal
Latent Community Analysis: PhD ProposalLatent Community Analysis: PhD Proposal
Latent Community Analysis: PhD Proposal
 
Moviesion: Content-based Movie Recommender Fueled by Linked Open Data
Moviesion: Content-based Movie Recommender Fueled by Linked Open DataMoviesion: Content-based Movie Recommender Fueled by Linked Open Data
Moviesion: Content-based Movie Recommender Fueled by Linked Open Data
 
Exploratory Social Network Analysis with Pajek: Blockmodels
Exploratory Social Network Analysis with Pajek: BlockmodelsExploratory Social Network Analysis with Pajek: Blockmodels
Exploratory Social Network Analysis with Pajek: Blockmodels
 
Exploratory Social Network Analysis: Ranking
Exploratory Social Network Analysis: RankingExploratory Social Network Analysis: Ranking
Exploratory Social Network Analysis: Ranking
 
Exploratory Social Network Analysis with Pajek: Diffusion
Exploratory Social Network Analysis with Pajek: DiffusionExploratory Social Network Analysis with Pajek: Diffusion
Exploratory Social Network Analysis with Pajek: Diffusion
 
Exploratory Social Network Analysis with Pajek: Center & Periphery
Exploratory Social Network Analysis with Pajek: Center & PeripheryExploratory Social Network Analysis with Pajek: Center & Periphery
Exploratory Social Network Analysis with Pajek: Center & Periphery
 
Exploratory Social Network Analysis with Pajek: Sentiments & Friendship
Exploratory Social Network Analysis with Pajek: Sentiments & FriendshipExploratory Social Network Analysis with Pajek: Sentiments & Friendship
Exploratory Social Network Analysis with Pajek: Sentiments & Friendship
 
Exploratory Social Network Analysis with Pajek: Attributes & Relations
Exploratory Social Network Analysis with Pajek: Attributes & RelationsExploratory Social Network Analysis with Pajek: Attributes & Relations
Exploratory Social Network Analysis with Pajek: Attributes & Relations
 
Temporal Network
Temporal NetworkTemporal Network
Temporal Network
 
Ontology Engineering
Ontology EngineeringOntology Engineering
Ontology Engineering
 
Software Test
Software TestSoftware Test
Software Test
 
Philosophical Software Developing
Philosophical Software DevelopingPhilosophical Software Developing
Philosophical Software Developing
 
Trend Analysis
Trend AnalysisTrend Analysis
Trend Analysis
 

Recently uploaded

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 

Recently uploaded (20)

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 

SEKE15: An ontology for describing security events

  • 2.
  • 3. Assault with a Weapon (Ink Pen) Incident Details: On Monday November 03, 2014, at approximately 11:45 AM, Ryerson Security & Emergency Services were made aware of the following incident:Approximately forty- five minutes earlier, the victim, a Ryerson community member, was approached by the subject on the 8th floor of the Ted Rogers School of Management (TRS) building, on the north end of the east corridor, near to the escalators. The victim noticed ... The subject then raised and swung his arm downward towards the victim with a pen in his hand... The subject was last observed exiting the Ted Rogers School of Management (TRS) building at approximately 11:05 PM and walking eastbound on the south sidewalk of Dundas Street east. Ryerson University Security & Emergency Services conducted safety planning with the victim and a patrol of the area, but did not locate a person matching the subject’s description. The victim reported no physical injuries, declined medical attention, and did not want Toronto Police Services involved at this time. Suspect information: Male, Approximately 20-25 years of age, Light/fair complexion, Short black hair in a brush cut, Wearing blue jeans, a dark- green long-sleeved shirt, beige shoulder bag, black running shoes with white soles, and eye glasses
  • 4.
  • 5. Information Extraction from Notifications Transform to Security Incident Ontology (SIO) Schema Updating Data Mart
  • 7.
  • 8. ★Available on the web (whatever format) but with an open license, to be Open Data ★★Available as machine-readable structured data (e.g. excel instead of image scan of a table) ★★★non-proprietary format (e.g. CSV instead of excel) ★★★★Use open standards from W3C (RDF and SPARQL) to identify things, so that people can point at your stuff ★★★★★Link your data to other people’s data to provide context Ontology http://semionet.rnet.ryerson.ca/ontologies/sio.owl Virtuoso Endpoint http://141.117.3.88:8890/sparql Graph IRI http://ls3.rnet.ryerson.ca/SecurityIncident/test
  • 9. Train & Build a NER to Security Events Text Improve the Quality of the SIO - Provenance - Anonymization - Documentation Register to LOD Cloud
  • 10. ls3.rnet.ryerson.ca Electrical & Computer Dept. Ryerson University Toronto Canada

Editor's Notes

  1. Ryerson University believes an informed community is a safer one. The Integrated Risk Management (IRM) system notifies all Ryerson staff, students, faculty and alumni (who have graduated within the past five years) by security incident alarms which are delivered directly via email [12]. For the urban campus is located at the downtown center of Toronto, the most populous, yet commercial capital city in Canada [13], such system seems indispensable to continually enhance the safety and security of the community. Toronto Police Service (TPS) provides several mailing lists for which citizens of different divisions can sign up to be kept up-to-date on current happenings across the city, and in their community
  2. Each notification includes temporal facts of the incident, location, victim and suspect details, and a brief account of whole event
  3. NER: Named Entity Recognizer: working properly in general text corpus and will fail in our domain specific context. (7 class model trained: Time, Location, Organization, Person, Money, Percent, Date)
  4. Foaf: friend of a freind Wn:wordnet Time:timeline
  5. Since incident information will come from different sources, the ontology should be enriched with provenance information; there are some ontologies for modeling provenance that can be used (e.g., W3C PROV-O). problem of anonymization (in order not to disclose personal information) and the effects on the ontology or the data to be represented. In order to publish the ontology, the authors should use the ontology URI (without file extension) and configure properly content negotiation. Furthermore, the ontology classes and properties must be documented.