Ubiquitous Connectivity and Threats: Architecting The Next Generation Cyber Security Operations

被引:0
|
作者
McCallam, Dennis H. [1 ]
Frazier, Preston D. [1 ]
Savold, Risa [1 ]
机构
[1] Northrop Grumman Corp, Falls Church, VA 22042 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to breakneck proliferation of advanced cyber threats, cyber security operations today face challenges that are conflating at an exponential rate. The explosion of the Internet of Things is projected to expand the universe of connected objects from 8.7 billion in 2012 to over 50 billion by 2020, which is going to inundate today's cyber security operations with a sensor data flood of untenable proportions. Additionally, the dearth of skilled cyber security practitioners is projected to increase seven-fold by 2020. The widening gap created by these two compounding trends can only be filled by developing autonomous, pervasive cyber security capabilities that embrace machine learning and automated cognitive technologies to digest immense volumes of data to detect anomalies, make inferences, develop threat intelligence, and automate a multitude of responses in the cyber security operational environment. This paper will explore a proven "system thinking" design approach to empower cyber security operations analysts to regain control of their enterprise network by highlighting necessary capabilities that allow a force multiplier to overcome both the skilled labor shortage and the looming tsunami of data.
引用
收藏
页码:1506 / 1509
页数:4
相关论文
共 50 条
  • [41] Generative AI in Cyber Security of Cyber Physical Systems: Benefits and Threats
    Mavikumbure, Harindra S.
    Cobilean, Victor
    Wickramasinghe, Chathurika S.
    Drake, Devin
    Manic, Milos
    2024 16TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, HSI 2024, 2024,
  • [42] Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
    Presekal, Alfan
    Jorjani, Mohsen
    Rajkumar, Vetrivel Subramaniam
    Goyel, Himanshu
    Cibin, Nicola
    Semertzis, Ioannis
    Stefanov, Alexandru
    Palensky, Peter
    IEEE ACCESS, 2024, 12 : 165756 - 165773
  • [43] Offensive Cyberspace Operations for Cyber Security
    Huskaj, Gazmend
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 476 - 479
  • [44] Rethinking cyber security for HPI operations
    Mick, Robert
    HYDROCARBON PROCESSING, 2009, 88 (10): : 13 - 13
  • [45] On the Use of Security Principles and Practices for Architecting Cyber-Physical Systems
    Krishna, Deepak
    Jha, Vikas Kumar
    Sharaf, Mohammad
    Muccini, Henry
    ACM PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE WORKSHOPS (ECSA-W), 2016,
  • [46] Accessible Cyber Security: The Next Frontier?
    Renaud, Karen
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 9 - 18
  • [47] Automotive Connectivity, Cyber Attack Scenarios and Automotive Cyber Security
    Haas, Roland E.
    Moeller, Dietmar P. F.
    2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2017, : 635 - 639
  • [48] A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers
    Han, Tao
    Jan, Syed Rooh Ullah
    Tan, Zhiyuan
    Usman, Muhammad
    Jan, Mian Ahmad
    Khan, Rahim
    Xu, Yongzhao
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (16):
  • [49] Ubiquitous mobility in next generation networks
    Rajan, Ashok Sunder
    Ma, Maode
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 53 - +
  • [50] Cyber Security Threats Detection Using Ensemble Architecture
    Chou, Te-Shun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (02): : 17 - 31