1 / 27

Vulnerability: An Ontological Analysis

Vulnerability: An Ontological Analysis. Eric Little, PhD Director, Center for Ontology and Interdisciplinary Studies D’Youville College Buffalo, NY little@dyc.edu eglittle@eng.buffalo.edu. Ontology for the Intel Community. Will include real world data (realism)

arleen
Download Presentation

Vulnerability: An Ontological Analysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Vulnerability: An Ontological Analysis Eric Little, PhD Director, Center for Ontology and Interdisciplinary Studies D’Youville College Buffalo, NY little@dyc.edu eglittle@eng.buffalo.edu

  2. Ontology for the Intel Community • Will include real world data (realism) • Will also include perspectival (e.g., sensor) data (epistemic layering) • Knowledge/data is: incomplete, possibly unreliable, conflicting, fallacious, etc. • Involves many types of sub-ontologies: e.g., physical ontologies, social ontologies, economic ontologies, etc. However … We can use the ontology to aid in the epistemological processing of a domain

  3. ONTOLOGY VS. EPISTEMOLOGY ONTOLOGY: REALITY Sensory Perception Mental Events informs informs DISCOVERY OF TRUTH (VERIDICAL) EPISTEMOLOGY: Mental Events Sensory Perception REALITY inform informs CREATION OF TRUTH (NON-VERIDICAL)

  4. The Structure of an Ontology • Upper-Level (Formal): • Most general categories of existence (e.g., existent item, spatial region, dependent part). • This Level of the ontology is rationally driven, meaning it is the product of philosophical reasoning. • Relies on a sound metaphysical description of the world (e.g., realism).

  5. The Structure of an Ontology • Domain – Specific Level: • Contains categories that are specific to a particular domain of interest (disaster, military/defense, medicine). • This level of the ontology is empirically driven, meaning it is produced by gathering expert knowledge about a given domain of interest. • The expert knowledge is used to create a consistent and comprehensive lexicon of terms.

  6. The Lexical Task • Lexicons need to be constructed to capture relevant data. • This is a manual task (not data/text mining task) • The lexicon will contain all the objects, attributes/properties, and relations representative of a given domain. • Realism + Perspectivalism is key. • Will serve as the basis of the ontology’s structure.

  7. Example of Free Text Data Though they can var widely in shape and form, IEDs share a common set of components and consist of the following: • An initiation system or fuze; • Explosive fill; • A detonator; • A power supply for the detonator; and • A container. Improvised devices are characterized by varying employment techniques. • Coupling. Coupling is a method of linking one mine or explosive device to another, usually with detonating cord. When the first device is detonated, it also detonates the linked explosive. This technique is often used to defeat countermine equipment, such as mine rollers • Rolling. The roller will pass over the initial, unfuzed device and set off the second fuzed device. This in turn detonates the overpassed device underneath the clearing vehicle. When the linked devices are directional fragmentation mines, they can create a large, lethal engagement area. • Boosting. Buried mines, UXOs, or other explosive devices are stacked on top of one another. The device buried deepest from the surface is fuzed. Fuzing only the deepest ordnance helps mask no- and low-metal explosive hazards placed near the surface. This reduces the probability of detection by metal detectors, and it increases the force of the blast. • Sensitizing antitank (AT) mines. On some nonmetallic AT mines, the pressure plate is cracked and the spring is removed to reduce the pressure required to initiate the mine. Similarly, the pressure plate can be removed from metallic AT mines to create the same effect. A pressurefuzed AP mine can be placed on the top of an AT mine, thus creating a very large AP mine as an alternative method. • Daisy chaining. AP mines may be used in daisy chains linked with other explosive hazards. Enemy forces may link the mines together with trip wire or detonating cord. When the initial mine is detonated, the other mines may detonate. This may also create large, lethal engagement areas.

  8. More Information to Capture …

  9. Methodology Lexical Terms Of Interest Domain Lexicon (alphabetized & organized) Here the lexicon moves from dictionary to thesaurus Manual Checking Free-Text Documents MANUAL MINING LEXICON CONSTRUCTION • Objs • Attributes • Relations Define Formal Relations Define Formal Relations Upper-Ontology Evaluation Procedure SNAP Ontology (Spatial Items) SPAN Ontology (Temporal Items) Knowledge Representation Tool Reasoning over Ontology Domain Ontology (Organized Domain Lexicon) Here is where we add probability, uncertainty, etc.

  10. Threat Ontology(ThrO)

  11. Goals: • Understand what ‘threats’ and ‘vulnerabilities’ are ontologically. • Distinguish between different types of threat types (conventional vs. asymmetric). • Help decision-makers formulate plans of actions based upon an increased understanding of both formal and informal data structures. • Define ‘Centers of Gravity’ for each kind of item. • Defining these canaid in the management of a threat situation.

  12. Situation & Threat Assessment (Higher-Level Fusion) Processes of reasoning about kinds of objects and events of interest, relations between them, their aggregates at different levels of granularity, and their behavior within a specific context. Calls for formally structured context-dependent information about reality capable of capturing various sorts of threat entities and the plethora of relations between them. Formal Ontology of threat

  13. What kinds of ontologies are needed for Threat Assessment? • Low-level fusion can be done (to a large degree) using existing tools such as OWL, Protégé, DAML - Oil, etc. • However, higher-level fusion processing is concerned with providing comprehensive and consistent descriptions of highly complex world states. • Hence we need a more “industrial strength” (cf. Musen) approach than is provided by many current fusion ontologies.

  14. Complexities Abound… Frank White (Workshop II on Ontologies and Higher-lvl Fusion – Beaver Hollow)

  15. Existing fusion ontology models often confuse various kinds of relations Temporal Relations Spatial Relations Situation Awareness (SAW) Ontology Model for Battlefield Relations (C. J. Matheus, M. M. Kokar, and K. Baclawski. (2003)

  16. It gets worse… State type: formed by a set of complex relations

  17. Taxonomy of Relation-Types Internal Relation Identity Founded External Relation Unfounded Grounded Relation Logical Relation Satisfied Presentational Relation Not Satisfied Real Satisfied Intentional Relation Representational Fictional Not Satisfied A & B Constitute each other Mutually-Dependent A & B are Founded on each other Existential Relation A is Constituted by B One-sided Dependent A is Founded on B Efficient Causality A is the Cause of B

  18. Intent Cap Intent Capability Intent Capability Opportunity Opportunity Formal Ontology of ‘Threat’ VIABLE THREAT • A viable threat exists as a tri-partite whole, a potential threat as a 2-part whole. • The 3 elements of a tri-partite whole form necessary dependence relations to one another. • Tri-partite wholes possess integrated parts which are inextricably related to one another. POTENTIAL THREAT

  19. The Concept of an Integrated Whole • It must consist of several parts. • These parts must stand to one another in certain formal relations. • These relations must connect the parts to one another. • The total relations of all the parts is characteristic for the kind of complex in question (i.e., one unifying attribute) See: Husserl (1900-01) and Simons (1987)

  20. Some Basic Metaphysical Components of Threat Ontology • Continuants and Occurrents (Grenon & Smith) • Granular partition theory (Bittner & Smith, Mark) • Mereotopology (Smith, Varzi, Casati)

  21. Continuants and Occurrents Continuant: (df.) = an entity that has a continuous existence and endures through time in spite of various rates of change (e.g., an organism, an army, a nation state). SNAP Transontological Relations are needed BFO Occurrent: (df.) = a four-dimensional item which occurs purely within time and unfolds itself through some period of time (e.g., a process, the firing of a weapon). SPAN

  22. Granular Partition Theory • Theory of 1) the relations between cells and their structures, and 2) the relations between cells and objects in reality. • Can treat the core, boundary, and exterior of an object(s). • Provides a means for handling problems of ontological vagueness and uncertainty. • E.g., where is the summit of Everest, the boundary of a wetland? • It is often hard to discern the boundaries between parts of mereological wholes. From: Bittner & Smith, (2003) “A theory of Granular Partitions”

  23. Composed of Mereology (the study of parts and part-relations) + Topology (the study of extendedness and contact) Threats contain relations between various kinds of continuants and occurrents, which often stand to one another as part-to-whole. Provides an axiomatic theory that can capture numerous kinds of relations needed for understanding threat items. A B Adjacency A B Mereotopology B A Overlap A B Separation Tangential Part A B Inclusion/Surrounding Reciprocal Interpenetration

  24. Dispersed vs. Compact Wholes Dispersed wholes are wholes, which are spatially, temporally or causally non-contiguous, but which nonetheless contain parts or members that stand to one another via a certain unifyingcharacteristic of that whole. Dispersed wholes are very important for studying unconventional threats…. Proximity measuresin the characteristics space andconstraintspermit for definition and understanding of dispersed wholes and the transition fromdispersed to compact whole. Constraints arecontext specific.

  25. Threats and Vulnerabilities Threat as Tri-partite Whole

  26. States such as ‘Vulnerability’ often consist of various complex relations (nested, etc.) • spatial and temporal regions containing various objects (e.g., x, y, …z, which can be both bounded or unbounded) • spatial distances between x and y (distances attributed to range, visibility, etc.) • scattered temporal regions related to various processes of x and y • physical attributes/properties of x and y (mobility, armor, weapons, size, shape, etc.) • nonphysical (e.g., intentional) attributes of x and y (goals, plans, directives, perceptions, etc.) • behaviors of x and y relative to one another (combinations of physical and nonphysical items leading to the manifestation of intentions/goals, carried out via opportunities)

  27. Conclusions We have presented a general theory for designing an upper ontology for threat and vulnerability. Future work: • Formalize Threat Components: • Intent, Capability & OPPORTUNITY • Implementation • User needs (e.g., CSE, GUI’s, scenarios) • Add in conditions for uncertainty and probability (of relations and situational items)

More Related