Theory and Models for Cyber Situation Awareness

Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether th

  • PDF / 22,983,520 Bytes
  • 228 Pages / 439.37 x 666.142 pts Page_size
  • 104 Downloads / 188 Views

DOWNLOAD

REPORT


State-of-the-Art Survey

Peng Liu Sushil Jajodia Cliff Wang (Eds.)

Theory and Models for Cyber Situation Awareness

Cyber SA Cognitive Processes & Models

Automated Reasoning

Interactive data triage & learning

Data Conditioning

• • •

Evidence fusion • Graphical models • Cross-layer dependency analysis • Cross-datasource

Identifying • unexplained behavior • Uncertainty analysis

Computer network

Real World

• • • •

Enterprise model Logs & traffic IDS reports Vulnerabilities

Security Analysts Cognitive models

• Data sources

123

Evidence fusion

Automated reasoning

Interactive





Computer network

Conditioning

Simulation platform

Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zurich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany

10030

More information about this series at http://www.springer.com/series/7408

Peng Liu Sushil Jajodia Cliff Wang (Eds.)

Theory and Models for Cyber Situation Awareness

123

Editors Peng Liu Pennsylvania State University University Park, PA USA

Cliff Wang Army Research Office Research Triangle Park, NC USA

Sushil Jajodia George Mason University Fairfax, VA USA

ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-319-61151-8 ISBN 978-3-319-61152-5 (eBook) DOI 10.1007/978-3-319-61152-5 Library of Congress Control Number: 2017945278 LNCS Sublibrary: SL2 – Programming and Software Engineering © Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to