<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY event "http://ebiquity.umbc.edu/ontology/event.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:event = "&event;"
		xmlns:person = "&person;"
		xmlns:assert = "&assert;">
	<event:Event rdf:about="http://ebiquity.umbc.edu/event/html/id/412/Beyond-Reactive-Management-of-Network-Intrusions">
		<rdfs:label><![CDATA[Beyond Reactive Management of Network Intrusions]]></rdfs:label>
		<event:title><![CDATA[Beyond Reactive Management of Network Intrusions]]></event:title>
		<event:speaker>
<person:Collaborator rdf:about="http://ebiquity.umbc.edu/person/html/Sushil/Jajodia"><person:name><![CDATA[Sushil Jajodia]]></person:name><rdfs:label><![CDATA[Sushil Jajodia]]></rdfs:label></person:Collaborator>
		</event:speaker>
		<event:startDate rdf:datatype="&xsd;dateTime">2011-10-12T12:00:00-05:00</event:startDate>
		<event:endDate rdf:datatype="&xsd;dateTime">2011-10-12T13:30:00-05:00</event:endDate>
		<event:location><![CDATA[ITE 456]]></event:location>
		<event:abstract><![CDATA[This talk will discuss issues and methods for survivability of systems under malicious attacks. To protect from such attacks, it is necessary to take steps to prevent attacks from succeeding. At the same time, it is important to recognize that not all attacks can be averted at the outset; attacks that are successful to some degree must be recognized as unavoidable and comprehensive support for identifying and responding to attacks is required.

In my talk, I will describe the recent research on attack graphs that represent known attack sequences attackers can use to penetrate computer networks. I will show how attack graphs can be used to compute actual sets of hardening measures that guarantee the safety of given critical resources. Attack graphs can also be used to correlate received alerts, hypothesize missing alerts, and predict future alerts, all at the same time. Thus, they offer a promising solution for administrators to monitor and predict the progress of an intrusion, and take appropriate countermeasures in a timely manner.

I will conclude my talk with a demo of the working system.]]></event:abstract>
		<event:uri><![CDATA[http://www.cs.umbc.edu/2011/10/talk-beyond-reactive-management-of-network-intrusions-noon-1012-ite456/]]></event:uri>
	</event:Event>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
