Theory and Models for Cyber Situation Awareness
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether th
- PDF / 22,983,520 Bytes
- 228 Pages / 439.37 x 666.142 pts Page_size
- 104 Downloads / 188 Views
State-of-the-Art Survey
Peng Liu Sushil Jajodia Cliff Wang (Eds.)
Theory and Models for Cyber Situation Awareness
Cyber SA Cognitive Processes & Models
Automated Reasoning
Interactive data triage & learning
Data Conditioning
• • •
Evidence fusion • Graphical models • Cross-layer dependency analysis • Cross-datasource
Identifying • unexplained behavior • Uncertainty analysis
Computer network
Real World
• • • •
Enterprise model Logs & traffic IDS reports Vulnerabilities
Security Analysts Cognitive models
• Data sources
123
Evidence fusion
Automated reasoning
Interactive
•
•
Computer network
Conditioning
Simulation platform
Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zurich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany
10030
More information about this series at http://www.springer.com/series/7408
Peng Liu Sushil Jajodia Cliff Wang (Eds.)
Theory and Models for Cyber Situation Awareness
123
Editors Peng Liu Pennsylvania State University University Park, PA USA
Cliff Wang Army Research Office Research Triangle Park, NC USA
Sushil Jajodia George Mason University Fairfax, VA USA
ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-319-61151-8 ISBN 978-3-319-61152-5 (eBook) DOI 10.1007/978-3-319-61152-5 Library of Congress Control Number: 2017945278 LNCS Sublibrary: SL2 – Programming and Software Engineering © Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to