A Data-Driven Approach to Security Science

被引:0
|
作者
Iyer, Ravishankar K. [1 ,2 ,3 ]
机构
[1] Univ Illinois, Coordinated Sci Lab, Urbana, IL 61801 USA
[2] Univ Illinois, Dept Elect & Comp Engn, Urbana, IL 61801 USA
[3] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In security more than in other computing disciplines, professionals depend heavily on rapid analysis of voluminous streams of data gathered by a combination of network-, file-, and system-level monitors. The data are used both to maintain a constant vigil against attacks and compromises on a target system and to improve the monitoring itself. While the focus of the security engineer is on ensuring operational security, it is our experience that the data are a gold mine of information that can be used to develop a greater fundamental insight and hence a stronger scientific basis for building, monitoring, and analyzing future secure systems. In order to facilitate timely and accurate detection and response to attacks several challenges must be addressed: 1. Challenge of navigating through a vast amount of data generated by security monitoring tools. 2. Challenge of conducting timely forensics and providing tools to extract and correlate information about the attack and its progress. 3. Challenge of validating and benchmarking the security monitoring infrastructure and the system resiliency to accidental errors and malicious attacks.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] A data-driven approach for embedded security
    Saputra, H
    Ozturk, O
    Vijaykrishnan, N
    Kandemir, M
    Brooks, R
    [J]. IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: NEW FRONTIERS IN VLSI DESIGN, 2005, : 104 - 109
  • [2] Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach
    Natella, Roberto
    Ceccarelli, Andrea
    Ficco, Massimo
    [J]. 2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 410 - 415
  • [3] Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach
    Tarahomi, Sousan
    Holz, Ralph
    Sperotto, Anna
    [J]. 2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 346 - 349
  • [4] An efficient security data-driven approach for implementing risk assessment
    Shameli-Sendi, Alireza
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [5] Data-driven predictions in the science of science
    Clauset, Aaron
    Larremore, Daniel B.
    Sinatra, Roberta
    [J]. SCIENCE, 2017, 355 (6324) : 477 - 480
  • [6] CIAM: A Data-Driven Approach for Selecting and Prioritizing Security Controls
    Llanso, Thomas
    [J]. 2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 91 - 98
  • [7] Data-driven science policy
    Fitzpatrick, Susan M.
    [J]. ISSUES IN SCIENCE AND TECHNOLOGY, 2016, 32 (04) : 17 - 18
  • [8] Data-Driven Science Policy
    Borner, Katy
    [J]. ISSUES IN SCIENCE AND TECHNOLOGY, 2016, 32 (03) : 26 - 28
  • [9] A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
    Thuraisingham, Bhavani
    Kantarcioglu, Murat
    Hamlen, Kevin
    Khan, Latifur
    Finin, Tim
    Joshi, Anupam
    Oates, Tim
    Bertino, Elisa
    [J]. PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 1 - 10
  • [10] Data-driven public health security
    Li, Cuiping
    Wu, Linhuan
    Shu, Chang
    Bao, Yiming
    Ma, Juncai
    Song, Shuhui
    [J]. CHINESE SCIENCE BULLETIN-CHINESE, 2024, 69 (09): : 1156 - 1163