Intrusion activity projection for cyber situational awareness

被引:9
|
作者
Yang, Shanchieh J. [1 ]
Byers, Stephen [1 ]
Holsopple, Jared [2 ]
Argauer, Brian [1 ]
Fava, Daniel [1 ]
机构
[1] Rochester Inst Technol, Dept Comp Engn, Rochester, NY 14623 USA
[2] SUNY Buffalo, Ctr Multisource Informat Fusion, New York, NY USA
关键词
D O I
10.1109/ISI.2008.4565048
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data may be correlated and form attack tracks, each of which consists of ordered collections of alerts belonging to a single multi-stage attack. Assessing an attack track in its early stage may reveal the attacker's capability and behavior trends, leading to projections of future intrusion activities. Behavior trends are captured via Variable Length Markov Models (VLMM) without predetermined attack plans. A virtual terrain schema is developed to model network and system configurations, and used to estimate critical elements and vulnerabilities exposed to each attacker given his/her progress. Experimental results show promises for these proactive measures in ensuring continuous and critical cyber operations.
引用
收藏
页码:167 / +
页数:2
相关论文
共 50 条
  • [1] Leverage Intrusion Detection System Framework For Cyber Situational Awareness System
    Masduki, Bisyron Wahyudi
    Ramli, Kalamullah
    Salman, Muhammad
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON SMART CITIES, AUTOMATION & INTELLIGENT COMPUTING SYSTEMS (ICON-SONICS 2017), 2017, : 64 - 69
  • [2] Cyber situational awareness
    Leopold, H.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (02): : 97 - 100
  • [3] Cyber Situational Awareness
    Helmut Leopold
    [J]. e & i Elektrotechnik und Informationstechnik, 2015, 132 (2) : 97 - 100
  • [4] Cyber Security Situational Awareness
    Tianfield, Huaglory
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 782 - 787
  • [5] Cyber situational awareness and differential hardening
    Dwivedi, Anurag
    Tebben, Dan
    [J]. CYBER SENSING 2012, 2012, 8408
  • [6] A Computational Model of Cyber Situational Awareness
    Dobson, Geoffrey B.
    Carley, Kathleen M.
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 395 - 400
  • [7] Cyber Protect: A Situational Awareness Platform
    Bokang, Mangoale
    Pantsi, Phumeza
    Mapimele, Fikile
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 187 - 194
  • [8] Mission Cyber Situational Awareness Operations
    Onwubiko, Cyril
    [J]. 2016 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2016,
  • [9] Security Evaluation for Cyber Situational Awareness
    Kotenko, Igor
    Doynikova, Elena
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1197 - 1204
  • [10] Situational awareness of a coordinated cyber attack
    Sudit, M
    Stotz, A
    Holender, M
    [J]. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 114 - 129