High-Level Information Fusion of Cyber-Security Expert Knowledge and Experimental Data

被引:0
|
作者
Costa, Paulo C. G. [1 ]
Yu, Bo [1 ]
Atighetchi, Michael [2 ]
Myers, David [3 ]
机构
[1] George Mason Univ, Volgenau Sch Engn, Fairfax, VA 22030 USA
[2] Raytheon BBN Technol, Cambridge, MA 02138 USA
[3] Air Force Res Lab, Rome, NY 13441 USA
关键词
ONTOLOGIES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
High-Level Information Fusion (HLIF) provides the ability to combine data from diverse sources, including documents involving analyst assessment and raw sensor reports generated by sensors, in a coherent and consistent way. Command and Control (C2) in cyber infrastructure involves gathering information from experts, merging it with field knowledge and experimental results, and selected the most appropriate cyber assets to deploy at any given time in the mission cycle. When framing cyber asset selection as a HLIF problem, one key aspect involves estimation of network-wide impacts generated by cyber assets. Cyberspace is a highly dynamic man-made domain with a high degree of uncertainty and incomplete data which must be transformed into knowledge to support precise and predictable cyber effects estimation. Current systems have to rely on human subject matter experts (SMEs) for most tasks, rendering the cyber asset planning process too time consuming and therefore operationally ineffective. This paper proposes an architecture that leverages probabilistic ontologies to expedite the cyber asset planning process, allowing for the automation of most time-consuming, error-prone, SME-based knowledge elicitation under uncertainty. We illustrate the main aspects of the proposed architecture through examples taken from the Derived and Integrated Cyber Assets (DICE) project.
引用
收藏
页码:2322 / 2329
页数:8
相关论文
共 50 条
  • [1] On Cyber-Security of Information Systems
    Sneps-Sneppe, Manfred
    Sukhomlin, Vladimir
    Namiot, Dmitry
    [J]. DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
  • [2] A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-Security
    Hogan, Jack
    Adams, Niall M.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 37 - 42
  • [3] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [4] Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
    Mendsaikhan, Otgonpurev
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    [J]. IEEE ACCESS, 2020, 8 : 177041 - 177052
  • [5] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [6] Cyber-Security Issues in Healthcare Information Technology
    Steve G. Langer
    [J]. Journal of Digital Imaging, 2017, 30 : 117 - 125
  • [7] Cyber-Security Issues in Healthcare Information Technology
    Langer, Steve G.
    [J]. JOURNAL OF DIGITAL IMAGING, 2017, 30 (01) : 117 - 125
  • [8] Antecedents for enhanced level of cyber-security in organisations
    Kumar, Saurabh
    Biswas, Baidyanath
    Bhatia, Manjot Singh
    Dora, Manoj
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2021, 34 (06) : 1597 - 1629
  • [9] Assessing Risk Estimations for Cyber-Security Using Expert Judgment
    Krisper, Michael
    Dobaj, Juergen
    Macher, Georg
    [J]. SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT (EUROSPI 2020), 2020, 1251 : 120 - 134
  • [10] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    [J]. COMPUTERS & SECURITY, 2020, 97