Applying the Scientific Method to Cybersecurity Research

被引:0
|
作者
Tardiff, Mark F. [1 ]
Bonheyo, George T. [1 ]
Cort, Katherine A. [1 ]
Edgar, Thomas W. [1 ]
Hess, Nancy J. [1 ]
Hutton, William J., III [1 ]
Miller, Erin A. [1 ]
Nowak, Kathleen E. [1 ]
Oehmen, Christopher S. [1 ]
Purvine, Emilie A. H. [1 ]
Schenter, Gregory K. [1 ]
Whitney, Paul D. [1 ]
机构
[1] Pacific North West Natl Lab, Natl Secur Directorate, Richland, WA 99354 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber environment has rapidly evolved from a curiosity to an essential component of the contemporary world. As the cyber environment has expanded and become more complex, so have the nature of adversaries and styles of attacks. Today, cyber incidents are an expected part of life. As a result, cybersecurity research emerged to address adversarial attacks interfering with or preventing normal cyber activities. Historical response to cybersecurity attacks is heavily skewed to tactical responses with an emphasis on rapid recovery. While threat mitigation is important and can be time critical, a knowledge gap exists with respect to developing the science of cybersecurity. Such a science will enable the development and testing of theories that lead to understanding the broad sweep of cyber threats and the ability to assess trade-offs in sustaining network missions while mitigating attacks. The Asymmetric Resilient Cybersecurity Initiative at Pacific Northwest National Laboratory is a multi-year, multi-million dollar investment to develop approaches for shifting the advantage to the defender and sustaining the operability of systems under attack. The initiative established a Science Council to focus attention on the research process for cybersecurity. The Council shares science practices, critiques research plans, and aids in documenting and reporting reproducible research results. The Council members represent ecology, economics, statistics, physics, computational chemistry, microbiology and genetics, and geochemistry. This paper reports the initial work of the Science Council to implement the scientific method in cybersecurity research. The second section describes the scientific method. The third section in this paper discusses scientific practices for cybersecurity research. Section four describes initial impacts of applying the science practices to cybersecurity research.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Robotic research: are we applying the scientific method?
    Antonelli, Gianluca
    [J]. FRONTIERS IN ROBOTICS AND AI, 2015,
  • [2] Applying art to scientific research: Reasons for using an original method
    Musso, Carlos G.
    Dricas, Debora
    Gonzalez-Torres, Henry
    [J]. ARCHIVOS ARGENTINOS DE PEDIATRIA, 2018, 116 (05): : 353 - 357
  • [3] SafeConfig17: Applying the Scientific Method to Active Cyber Defense Research
    Multari, Nicholas J.
    Singhal, Anoop
    Miller, Erin
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2641 - 2642
  • [4] Investigating Cybersecurity News Articles by Applying Topic Modeling Method
    Ghasiya, Piyush
    Okamura, Koji
    [J]. 35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 432 - 438
  • [5] APPLYING THE SCIENTIFIC METHOD TO SOCIAL PHENOMENA
    Lundberg, George A.
    [J]. SOCIOLOGY AND SOCIAL RESEARCH, 1949, 34 (01): : 3 - 12
  • [6] Making sense of scientific research and applying it properly
    Sifri, M
    [J]. JOURNAL OF APPLIED POULTRY RESEARCH, 2002, 11 (04): : 430 - 430
  • [7] SCIENTIFIC METHOD AS THE FOUNDATION OF SCIENTIFIC RESEARCH
    Kovacic Popovic, Anita
    [J]. INTERNATIONAL REVIEW, 2021, (1-2): : 10 - 14
  • [8] Research and Application of Risk Assessment Method for Automotive Cybersecurity
    Ji, Haojie
    Yu, Haiyang
    Wang, Yinghui
    Peng, Jing
    [J]. CICTP 2021: ADVANCED TRANSPORTATION, ENHANCED CONNECTION, 2021, : 1535 - 1544
  • [9] Applying Privacy-by-Conception in Cybersecurity
    Bianchini, Alessio
    Sartini, Elena
    Briguglio, Luigi
    [J]. ERCIM NEWS, 2021, (126): : 10 - 11
  • [10] Applying Blockchain as a Decentralized Cybersecurity Framework
    Alruwaili, Fahad F.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (02): : 113 - 119