{"title":"A decision support model for situational awareness in National Cyber Operations Centers","authors":"Roman Graf, Florian Skopik, Kenny Whitebloom","doi":"10.1109/CyberSA.2016.7503281","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503281","url":null,"abstract":"Advances in situational awareness technology have led to the creation of increasingly sophisticated tools across different application domains, often involving non-textual, highly dimensional, and multimedia data. Automated tools aim to address a number of situational awareness challenges, such as complex system topology, rapidly changing technologies, high noise to signal ratio, and multi-faceted threats. These factors make real-time situational awareness of cyber operations for the National Cyber Operations Centers very difficult to achieve. Appropriate data analysis techniques, in combination with modern anomaly detection output data and user knowledge, may provide solutions in real-time that could replace human input for many situational awareness analysis tasks.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133624428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing cyber situation awareness for Non-Expert Users using visual analytics","authors":"P. Legg","doi":"10.1109/CyberSA.2016.7503278","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503278","url":null,"abstract":"Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be understood in an organisational cybersecurity context, there is a strong case to be made for effective cybersecurity situation awareness that is tailored to the needs of the Non-Expert User (NEU). Our online usage habits are rapidly evolving with smartphones and tablets being widely used to access resources online. In order for NEUs to remain safe online, there is a need to enhance awareness and understanding of cybersecurity concerns, such as how devices may be acting online, and what data is being shared between devices. In this paper, we explore the notion of personal situation awareness for NEUs. We conduct a small-scale study to understand how NEUs perceive cybersecurity. We also propose how visual analytics could be used to help encourage NEUs to actively monitor and observe their activity for greater online awareness. The guidance developed through the course of this work can help practitioners develop tools that could help NEUs better understand their online actions, with the aim to result in safer experiences when acting online.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Are we managing the risk of sharing cyber situational awareness? A UK Public Sector case study","authors":"M. Davies, Menisha Patel","doi":"10.1109/CyberSA.2016.7503292","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503292","url":null,"abstract":"The development of effective cyber situational awareness, that makes a significant contribution to the decision making process around information risk management, is an important goal for organizations across all sectors. The sharing of such information between and within organizations is seen as a key security enabler. This paper considers a case study of a UK Public Sector organization. The aim is to establish if the decision to share cyber situational awareness has been taken from an information risk management perspective, and to examine whether or not the organization is suitably well-placed, to manage the consequences of information loss, occurring as a result of the sharing process.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Situation aware intrusion recovery policy in WSNs","authors":"Eliana Stavrou, A. Pitsillides","doi":"10.1109/CyberSA.2016.7503285","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503285","url":null,"abstract":"Wireless Sensor Networks (WSNs) have been gaining tremendous research attention the last few years as they support a broad range of applications in the context of the Internet of Things. WSN-driven applications greatly depend on the sensors' observations to support decision-making and respond accordingly to reported critical events. In case of compromisation, it is vital to recover compromised WSN services and continue to operate as expected. To achieve an effective restoration of compromised WSN services, sensors should be equipped with the logic to take recovery decisions and self-heal. Self-healing is challenging as sensors should be aware of a variety of aspects in order to take effective decisions and maximize the recovery benefits. So far situation awareness has not been actively investigated in an intrusion recovery context. This research work formulates situation aware intrusion recovery policy design guidelines in order to drive the design of new intrusion recovery solutions that are operated by an adaptable policy. An adaptable intrusion recovery policy is presented taking into consideration the proposed design guidelines. The evaluation results demonstrate that the proposed policy can address advanced attack strategies and aid the sensors to recover the network's operation under different attack situations and intrusion recovery requirements.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"43 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet discussion forums: Maximizing choice in health-seeking behaviour during public health emergencies","authors":"J. Cole, D. Kleine, C. Watkins","doi":"10.1109/CyberSA.2016.7503283","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503283","url":null,"abstract":"This paper proposes a new approach to improving our understanding of the suitability of internet discussion forums for use by health information seekers. We consider in particular their potential use during public health emergencies when access to conventional experts and healthcare professionals may be constrained. We explore potential benefits and challenges of crowdsourcing information on health issues in online environments through the context of Computer Science theories of Collective Intelligence [1, 2], which explore how members of a group - particularly when networked by computer systems - can reach a better solution than an individual working alone. We ask if online discussion forums can provide the `clever mechanism' Surowiecki [3] proposed is necessary to harness such potential group wisdom, and help health information seekers to identify the best option or `maximized choice' from a set of less-than-ideal choices [4], thus adding value to information seeking during public health emergencies.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114531515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge","authors":"Jan M. Ahrend, M. Jirotka, K. Jones","doi":"10.1109/CyberSA.2016.7503279","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503279","url":null,"abstract":"While the need for empirical investigations of cybersecurity analysts' collaborative work practices is widely acknowledged, research efforts are fairly limited. This paper aims to provide empirical evidence to support a deeper consideration for the seemingly intangible collaborative practices that situational awareness in cybersecurity relies on and add to our understanding of what it means to “do” threat intelligence. In particular, it aims to unpack the informal forms of collaboration and coordination at work that build tacit knowledge about threat actors and defenders and that span across time, people and tools to inform the translation of threat information into actionable threat intelligence. In-depth semi-structured interviews and diary studies are conducted at three cyber threat intelligence service providers (N=5) and analyzed using thematic analysis. This paper introduces the concept of Threat and Defence Knowledge, tacit knowledge that analysts within an organization form over time and utilize through informal ways of becoming aware of this knowledge, making it available and correlating it. We find that a lack of accessibility to knowledge about relevant threat and defence factors can reduce analysts' effectiveness at arriving at actionable threat intelligence and hence reduce the ability to be alerted in advance about cyber threats, to contain damage and obtain situational awareness. Perceived and potential shortcomings of the existing processes and tools are presented, and practices to circumvent the existing systems investigated and implications for design are considered.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122732517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol","authors":"M. Ghanem, Deepthi N. Ratnayake","doi":"10.1109/CyberSA.2016.7503286","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503286","url":null,"abstract":"The nature of wireless network transmission and the emerging attacks are continuously creating or exploiting more vulnerabilities. Despite the fact that the security mechanisms and protocols are constantly upgraded and enhanced, the Small Office/Home Office (SOHO) environments that cannot afford a separate authentication system, and generally adopt the IEEE 802.11 Wi-Fi-Protected-Access-2/Pre-Shared-Key (WPA2-PSK) are still exposed to some attack categories such as de-authentication attacks that aim to push wireless client to re-authenticate to the Access Point (AP) and try to capture the keys exchanged during the handshake to compromise the network security. This kind of attack is impossible to detect or prevent in spite of having an Intrusion Detection and Prevention System (IDPS) installed on the client or on the AP, especially when the attack is not repetitive and is targeting only one client. This paper proposes a novel method which can mitigate and eliminate the risk of exposing the PSK to be captured during the re-authentication process by introducing a novel re-authentication protocol relying on an enhanced four-way handshake which does not require any hardware upgrade or heavy-weight cryptography affecting the network flexibility and performances.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129747734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber attacks and maritime situational awareness evidence from Japan and Taiwan","authors":"J. Burton","doi":"10.1109/CyberSA.2016.7503295","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503295","url":null,"abstract":"This paper argues that cyber-attacks are increasingly being seen as a threat to maritime situational awareness in the Asia Pacific region, and highlights how the Japanese and Taiwanese governments have been developing both offensive and defensive cyber operations to ameliorate vulnerabilities in their naval fleets vis-a-vis their respective relationships with China. The paper begins by exploring traditional understandings of maritime situational awareness and how changes in Information and Communications Technology (ICT) have transformed the maritime strategic environment in recent decades. The paper moves on to explore how countries in the region, including China, the US, Japan and Taiwan are developing new capabilities in this area and new military doctrine to avoid disruptions to maritime operations. The final section of the paper presents a forward looking analysis of how cyber-attacks could affect military responses to territorial dispute in the South China Sea in particular, and the normative dangers of cyber militarization in the naval domain. The paper is based on field research conducted in Japan and Taiwan in 2014/15.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building an effective and efficient continuous web application security program","authors":"Ma Bang, Himanshu Saraswat","doi":"10.1109/CyberSA.2016.7503287","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503287","url":null,"abstract":"Most of organizations today either have some kind of web application security program or trying to build/enhance. However most of these programs are not getting expected results to organization, neither long lasting nor able to deliver value in continuous and efficient manner and also unable to enhance mind set of developers to build/design secure web applications. A strong application security program involves built in security into Application Development Lifecycle (S-SDLC), developing security guidelines and standards, creating awareness and security trainings, execute effective web application security assessment, establishing meaniningful security dashboards for each stake holder from executives, directors, program managers to developers.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"937 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}