{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T10:28:14Z","timestamp":1774434494825,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T00:00:00Z","timestamp":1708560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research Fund KU Leuven","award":["101070176"],"award-info":[{"award-number":["101070176"]}]},{"name":"Flemish Research Programme Cybersecurity","award":["101070176"],"award-info":[{"award-number":["101070176"]}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101070176"],"award-info":[{"award-number":["101070176"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously modeling the complex relationships between various cybersecurity concepts and properties. Leveraging this knowledge, they provide a foundation for designing more intelligent and adaptive cybersecurity systems. In this work, we propose an ontology-based cybersecurity framework that extends well-known cybersecurity ontologies to specifically model and manage threats imposed on applications, systems, and services that rely on artificial intelligence (AI). More specifically, our efforts focus on documenting prevalent machine learning (ML) threats and countermeasures, including the mechanisms by which emerging attacks circumvent existing defenses as well as the arms race between them. In the ever-expanding AI threat landscape, the goal of this work is to systematically formalize a body of knowledge intended to complement existing taxonomies and threat-modeling approaches of applications empowered by AI and to facilitate their automated assessment by leveraging enhanced reasoning capabilities.<\/jats:p>","DOI":"10.3390\/fi16030069","type":"journal-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T11:28:47Z","timestamp":1708601327000},"page":"69","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6279-4430","authenticated-orcid":false,"given":"Davy","family":"Preuveneers","sequence":"first","affiliation":[{"name":"DistriNet, KU Leuven, Celestijnenlaan 200A, B-3001 Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7710-5092","authenticated-orcid":false,"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"DistriNet, KU Leuven, Celestijnenlaan 200A, B-3001 Leuven, Belgium"}]}],"member":"1968","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"key":"ref_1","unstructured":"Syed, Z., Padia, A., Finin, T., Mathews, L., and Joshi, A. (2024, January 23). UCO: A Unified Cybersecurity Ontology. UMBC Student Collection. Available online: https:\/\/www.researchgate.net\/publication\/287195565_UCO_A_Unified_Cybersecurity_Ontology."},{"key":"ref_2","unstructured":"MITRE (2024, January 23). ATLAS\u2014Adversarial Threat Landscape for Artificial-Intelligence Systems (Website v3.6.0, Data v4.5.0). Available online: https:\/\/oecd.ai\/en\/catalogue\/tools\/atlas-adversarial-threat-landscape-for-artificial-intelligence-systems."},{"key":"ref_3","unstructured":"Roy, S., Panaousis, E., Noakes, C., Laszka, A., Panda, S., and Loukas, G. (2023). SoK: The MITRE ATT&CK Framework in Research and Practice. arXiv."},{"key":"ref_4","unstructured":"Al-Sada, B., Sadighian, A., and Oligeri, G. (2023). MITRE ATT&CK: State of the Art and Way Forward. arXiv."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Chen, L., Ye, Y., and Bourlai, T. (2017, January 11\u201313). Adversarial machine learning in malware detection: Arms race between evasion attack and defense. Proceedings of the 2017 European Intelligence and Security Informatics Conference (EISIC), Attica, Greece.","DOI":"10.1109\/EISIC.2017.21"},{"key":"ref_6","first-page":"15","article-title":"Arms race in adversarial malware detection: A survey","volume":"55","author":"Li","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Onwubiko, C. (2018, January 11\u201312). Cocoa: An ontology for cybersecurity operations centre analysis process. Proceedings of the 2018 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow, UK.","DOI":"10.1109\/CyberSA.2018.8551486"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., and Jardim-Goncalves, R. (2018). An ontology-based cybersecurity framework for the internet of things. Sensors, 18.","DOI":"10.3390\/s18093053"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Martins, B.F., Serrano, L., Reyes, J.F., Panach, J.I., Pastor, O., and Rochwerger, B. (2020, January 25\u201327). Conceptual characterization of cybersecurity ontologies. Proceedings of the IFIP Working Conference on the Practice of Enterprise Modeling, Riga, Latvia.","DOI":"10.1007\/978-3-030-63479-7_22"},{"key":"ref_10","unstructured":"ENISA (2021). Securing Machine Learning Algorithms."},{"key":"ref_11","unstructured":"(2009). Information Technology, Security Techniques, Information Security Management Systems, Overview and Vocabulary (Standard No. ISO 27000)."},{"key":"ref_12","unstructured":"Tidjon, L.N., and Khomh, F. (2022). Threat assessment in machine learning based systems. arXiv."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Mauri, L., and Damiani, E. (2022). Modeling threats to AI-ML systems using STRIDE. Sensors, 22.","DOI":"10.3390\/s22176662"},{"key":"ref_14","unstructured":"Jordan, B., Piazza, R., and Darley, T. (STIX, 2021). STIX, version 2.1."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10817-014-9305-1","article-title":"HermiT: An OWL 2 reasoner","volume":"53","author":"Glimm","year":"2014","journal-title":"J. Autom. Reason."},{"key":"ref_16","unstructured":"Kazakov, Y., Kr\u00f6tzsch, M., and Siman\u010d\u00edk, F. (2012). ELK: A reasoner for OWL EL ontologies. Syst. Descr., Available online: https:\/\/www.uni-ulm.de\/fileadmin\/website_uni_ulm\/iui.inst.090\/Publikationen\/2012\/KazKroSim12ELK_TR.pdf."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/2757001.2757003","article-title":"The prot\u00e9g\u00e9 project: A look back and a look forward","volume":"1","author":"Musen","year":"2015","journal-title":"AI Matters"},{"key":"ref_18","unstructured":"Ben-Kiki, O., Evans, C., and Net d\u00f6t, I. (2024, January 23). YAML Ain\u2019t Markup Language (YAML\u2122) Version 1.2. Available online: https:\/\/yaml.org\/spec\/1.2\/spec.html."},{"key":"ref_19","unstructured":"Johnson, C., Badger, M., Waltermire, D., Snyder, J., and Skorupka, C. (2024, January 23). Guide to Cyber Threat Information Sharing, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/nist.sp.800-150.pdf."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Vrande\u010di\u0107, D., Bontcheva, K., Su\u00e1rez-Figueroa, M.C., Presutti, V., Celino, I., Sabou, M., Kaffee, L.A., and Simperl, E. (2018, January 8\u201312). The SPAR Ontologies. Proceedings of the Semantic Web\u2014ISWC 2018, Monterey, CA, USA.","DOI":"10.1007\/978-3-030-00668-6"},{"key":"ref_21","unstructured":"Le, H., Pham, Q., Sahoo, D., and Hoi, S.C.H. (2018). URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection. arXiv."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"102964","DOI":"10.1016\/j.cose.2022.102964","article-title":"GramBeddings: A new neural network for URL based identification of phishing web pages through n-gram embeddings","volume":"124","author":"Bozkir","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Li, X., and Li, F. (2016). Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics. arXiv.","DOI":"10.1109\/ICCV.2017.615"},{"key":"ref_24","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2015). Explaining and Harnessing Adversarial Examples. arXiv."},{"key":"ref_25","unstructured":"Carlini, N., and Wagner, D. (November, January 30). Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec \u201917, New York, NY, USA."},{"key":"ref_26","first-page":"294","article-title":"Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning","volume":"55","author":"Grosse","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_27","unstructured":"Horridge, M., Drummond, N., Goodwin, J., Rector, A.L., Stevens, R., and Wang, H. (2006, January 10\u201311). The Manchester OWL syntax. Proceedings of the OWLed, Athens, GA, USA."},{"key":"ref_28","unstructured":"Lam, A.N., Elves\u00e6ter, B., and Martin-Recuerda, F. (2023, January 29). A Performance Evaluation of OWL 2 DL Reasoners using ORE 2015 and Very Large Bio Ontologies. Proceedings of the DMKG 2023: 1st International Workshop on Data Management for Knowledge Graphs, Hersonissos, Greece."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"92735","DOI":"10.1109\/ACCESS.2021.3092646","article-title":"Adversarial Attacks Against Face Recognition: A Comprehensive Study","volume":"9","author":"Vakhshiteh","year":"2021","journal-title":"IEEE Access"},{"key":"ref_30","unstructured":"Shan, S., Wenger, E., Zhang, J., Li, H., Zheng, H., and Zhao, B.Y. (2020). Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"G\u00f3mez, A., and Mu\u00f1oz, A. (2023). Deep Learning-Based Attack Detection and Classification in Android Devices. Electronics, 12.","DOI":"10.3390\/electronics12153253"},{"key":"ref_32","first-page":"1117","article-title":"DAICS: A deep learning solution for anomaly detection in industrial control systems","volume":"10","author":"Abdelaty","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/3\/69\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:03:05Z","timestamp":1760104985000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/3\/69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,22]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["fi16030069"],"URL":"https:\/\/doi.org\/10.3390\/fi16030069","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,22]]}}}