Theory and Models for Cyber Situation Awareness
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether th
- PDF / 22,983,520 Bytes
- 228 Pages / 439.37 x 666.142 pts Page_size
- 104 Downloads / 242 Views
		    State-of-the-Art Survey
 
 Peng Liu Sushil Jajodia Cliff Wang (Eds.)
 
 Theory and Models for Cyber Situation Awareness
 
 Cyber SA Cognitive Processes & Models
 
 Automated Reasoning
 
 Interactive data triage & learning
 
 Data Conditioning
 
 • • •
 
 Evidence fusion • Graphical models • Cross-layer dependency analysis • Cross-datasource
 
 Identifying • unexplained behavior • Uncertainty analysis
 
 Computer network
 
 Real World
 
 • • • •
 
 Enterprise model Logs & traffic IDS reports Vulnerabilities
 
 Security Analysts Cognitive models
 
 • Data sources
 
 123
 
 Evidence fusion
 
 Automated reasoning
 
 Interactive
 
 •
 
 •
 
 Computer network
 
 Conditioning
 
 Simulation platform
 
 Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
 
 Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zurich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany
 
 10030
 
 More information about this series at http://www.springer.com/series/7408
 
 Peng Liu Sushil Jajodia Cliff Wang (Eds.)
 
 Theory and Models for Cyber Situation Awareness
 
 123
 
 Editors Peng Liu Pennsylvania State University University Park, PA USA
 
 Cliff Wang Army Research Office Research Triangle Park, NC USA
 
 Sushil Jajodia George Mason University Fairfax, VA USA
 
 ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-319-61151-8 ISBN 978-3-319-61152-5 (eBook) DOI 10.1007/978-3-319-61152-5 Library of Congress Control Number: 2017945278 LNCS Sublibrary: SL2 – Programming and Software Engineering © Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to		
 
	 
	 
	 
	 
	 
	 
	 
	 
	 
	 
	