CC2 Ontology Notes
Jon Doyle
MIT Laboratory for Computer Science
The following outline lists a variety of terms needed in an ontology
for CC2. The list below heavily emphasizes terms related to
monitoring, both monitoring in the abstract (signals and operations on
them) and concepts related to the MAITA system in particular.
Coverage is much lighter on concepts related to computation, computer
systems and processes, networks, and military notions.
The lists below are not polished, as this didn't seem warranted before
merging these lists with those produced by others. The hierarchical
placements of these terms also should not be regarded as firm.
Undoubtedly many will shift location as they appear in more
comprehensive ontologies (e.g., CYC) in more general positions.
Monitoring concepts
General concepts
The general monitoring concepts include signals, their
characteristics, operations on signals, and their characteristics.
Many of the concepts under the general concepts represent mathematical
notions of wider applicability.
- Signals
- Characteristics
- Data rates
- Statistics
- Error rates
- Channel characteristics (ROC)
- Sensitivity/Recall
- Selectivity/Specificity
- Signal to noise ratio
- Continuous or discrete
- Numerical or symbolic
- Range of values
- Encodings
- Temporal variability of characteristics
- Continuous
- Sampling rates
- Functions
- Algebra of functions
- Composition
- inverse
- isomorphisms
- homomorphisms
- products, sums
- projections, retracts, pullbacks, pushouts
- Categories, topoi, locales, theories
- Topology
- continuity and discontinuity
- Over ordered spaces
- Order topologies
- Increasing
- Decreasing
- Stationary
- Fluctuating
- Asymptotics and limits
- Bounded
- Bounded below
- Bounded above
- Unbounded
- Unbounded above
- Unbounded below
- Norms and distance functions
- Metrical topologies
- Analyis
- Waveforms
- Periodicity
- Periodic
- Aperiodic
- Quasi-periodic
- Frequency
- Dimension
- Shape
- Sinusoidal
- Sawtooth
- Square
- Ramp
- Spike
- Leading spike
- Trailing spike
- Exponential
- S-curve
- Exponential growth
- Exponential decay
- Logarithmic
- Modulation
- Amplitude
- Dual sideband
- Single sideband
- Frequency
- Phase
- Fourier analysis
- fundamental frequency
- harmonics
- spectrum
- convolution
- Discrete
- Boolean
- Linguistic
- Formal
- Regular
- Context free
- Context sensitive
- Informal
- Structure
- Textual
- Sentential
- Discourse
- Dialog
- Syntax
- alphabet
- symbols, words
- terms
- names
- proper names
- functions
- relations
- constants
- quantifiers
- universal
- existential
- numerical
- probabilistic
- connectives
- parts of speech
- modality
- necessity
- possibility
- conditionals
- descriptions
- defaults
- rules
- Organization
- Logic
- Semantics
- models
- interpretations
- entailment
- subsumption
- Completeness
- Soundness
- Categoricity
- Pragmatics
- Mental
- Graded
- Probabilistic
- Fuzzy
- Dempster-Shafer
- Nonstandard values
- Transducers
- Fourier
- Outliers
- Convolution
- Averaging
- Kalman
- Correlators
- Logical rules
- Bayesian networks
MAITA concepts
The following concepts are reasonably specific to the MAITA system,
though some occur in other contexts and may be more generally
applicable to monitoring in general.
- Monitoring system (MAITA at least)
- Monitoring processes
- Subprocesses
- Monitor terminals
- Input
- Output
- Control
- Database
- Knowledge base
- Communications
- Monitoring networks
- Connections
- Directions
- Protocols
- Ports
- Monitoring information
- Signals
- Alerts
- Control information
- Reports
- Packets
- Data types
- Encodings
- Databases
- Knowledge bases
- Displays
- MOM control panels
- Process control panels
- Strip charts
- Single variable
- Multiple variable
- Two-dimensional displays
- Variable against variable
- Geographic
- Topological
- Textual
- Audio
- Temporal characteristics
- Temporal windows
- Display rates
- Markers and labels
- Visual characteristics
- Colors
- Sizes
- Arrangements
- Flashing
- Operating system
- Editors
- Monitoring network editors
- Process parameters or operating characteristics
- Monitoring library editors
- Knowledge base editors
- Database editors
Computing and communications concepts
A lot more detail is needed in most of these things. Some could come
from the CCD concepts, but many needed concepts are more abstract than
the CCD ones.
- Communications
- Messages
- Coding
- Encoding
- Encryption
- Decoding
- Directionality
- Dispersion
- Point-to-point
- Multicast
- Broadcast
- Multisource receivers
- Blackboards
- Sources
- Destinations
- Transmission
- Rates
- Media
- Protocols
- Errors
- Misrouting
- Loss
- Delay
- Jitter
- Noise
- Corruption
- Evolution
- Rerouting
- Forwarding
- Bouncing
- Refusal
- Repudiation
- Network topology
- Nodes
- Links
- Paths
- Cycles
- Components
- Separators
- Mechanisms
- Switches
- Routers
- Firewalls
- Ports
- Listeners
- Connections
- Sockets
- Computation
- Algorithms
- Software
- Modules
- Compilers
- Linkers
- Applications
- OS
- Versions
- Patches
- Specifications
- Implementations
- Hardware
- Memory
- Paging
- File system
- Processes
- Subprocesses
- Threads
- Owners
- Groups
- permissions
- Personnel
- Sysadmins
- CERT organizations
- Users
- Guests
- Intruders
Actors
The following lists exhibit some overlaps and require some
reorganization. Some of these concepts may not be of direct interest
in CC2, depending on how detailed we need to make models of threat
situations and rationales for expecting attacks.
- Types
- Individuals
- Organizations
- Adversaries
- Allies
- Neutrals
- Human
- Machine processes, computational agents
- Commanders
- Staffs
- Mental attitudes
- Meaning
- entrenchment
- measurement or grading
- Belief
- Absolute belief
- relative belief
- certainty
- conditionals
- expectations
- role
- Assumption
- hypothesis
- conclusion
- plausible conclusion
- Desire
- Desire
- relative desire or preference
- utility
- Intention
- Intent
- Relative intention
- plan
- priority
- Hope
- Fear
- Trust
- Suspicion
- Cognitive properties
- Knowledge
- Knowledge
- completeness
- incompleteness
- correctness
- Rationality
- Volition
- Wantonness
- Deliberateness
- Changability
- Morality
- Sanity
- Cognitive concepts
- Obligations, promises, commitments
- Language, words, concepts, terms, names, proper names,
relations, quantifiers, connectives, parts of speech,
discourse, dialog, texts, interpretations, models, logics,
syntax, semantics, pragmatics, implicature
- Recognition of meaning, of intent, of plans, of identity
- Understanding, comprehension, translation, paraphrase,
canonical forms
- Minds, mental faculties, mental capabilities, performance
- Brains, bodies, organs, brain regions
- Trust, distrust, suspicion
- Fear, hope, panic, terror, joy, satisfaction,
dissatisfaction, annoyance, hesitation, confidence,
assertion, aggression, combativeness, passivity,
discipline, training, obedience, disobedience, readiness,
- Actions
- Motivations, desires
- Intents
- Strength of intent, will
- Completeness of intention, plans
- Plans, decomposition
- Decisions
- State and outcomes
- Actions and alternatives
- Probabilities of outcomes given actions
- Utility of outcomes (preferences)
- Decision methods
- Individual
- Group
- Ideal rationality
- Max expected utility
- Unanimity
- Bounded rationality
- Satisficing
- Rule guided (habitual)
Command and control
These concepts need augmentation with more general military concepts.
It lacks all concepts of specific weapons, systems, military
organization, etc.
- Command and control
- Operations plan
- Mission
- Commander's intent
- Plan
- Strategy
- Tactics
- Tasks
- Target lists
- Intelligence annex
- IPB
- Situation
- Key terrain
- Mobility corridors
- Trafficability
- Weather
- Line of sight
- Political situation
- Warfare, conflicts, tensions, terrorist
- Economic, trade
- Demographic
- News events (triggering activity)
- Geographic, terrain, communications
- Agricultural, industrial,
- Weather, seismic, seasonal
- Organizations and actors
- Expectations, counterfactuals, assumptions
- Assets
- Threats
- Threatening agents
- Vulnerabilities
- Methods of exploiting
- Probability method will succeed
- Knowledge of method list (complete, incomplete)
- Reasons for exploiting
- Methods of defense
- Resulting compromises or effects
- From successful attack
- From partially successful attack
- From unsuccessful attack
- Doctrine
- Rules of engagement
- Legal systems
Last modified: Fri Sep 10 10:36:37 EDT 1999
Jon Doyle
<doyle@mit.edu>