2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)最新文献

筛选
英文 中文
A decision support model for situational awareness in National Cyber Operations Centers 国家网络作战中心态势感知决策支持模型
Roman Graf, Florian Skopik, Kenny Whitebloom
{"title":"A decision support model for situational awareness in National Cyber Operations Centers","authors":"Roman Graf, Florian Skopik, Kenny Whitebloom","doi":"10.1109/CyberSA.2016.7503281","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503281","url":null,"abstract":"Advances in situational awareness technology have led to the creation of increasingly sophisticated tools across different application domains, often involving non-textual, highly dimensional, and multimedia data. Automated tools aim to address a number of situational awareness challenges, such as complex system topology, rapidly changing technologies, high noise to signal ratio, and multi-faceted threats. These factors make real-time situational awareness of cyber operations for the National Cyber Operations Centers very difficult to achieve. Appropriate data analysis techniques, in combination with modern anomaly detection output data and user knowledge, may provide solutions in real-time that could replace human input for many situational awareness analysis tasks.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133624428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing cyber situation awareness for Non-Expert Users using visual analytics 使用视觉分析增强非专家用户的网络态势感知
P. Legg
{"title":"Enhancing cyber situation awareness for Non-Expert Users using visual analytics","authors":"P. Legg","doi":"10.1109/CyberSA.2016.7503278","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503278","url":null,"abstract":"Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be understood in an organisational cybersecurity context, there is a strong case to be made for effective cybersecurity situation awareness that is tailored to the needs of the Non-Expert User (NEU). Our online usage habits are rapidly evolving with smartphones and tablets being widely used to access resources online. In order for NEUs to remain safe online, there is a need to enhance awareness and understanding of cybersecurity concerns, such as how devices may be acting online, and what data is being shared between devices. In this paper, we explore the notion of personal situation awareness for NEUs. We conduct a small-scale study to understand how NEUs perceive cybersecurity. We also propose how visual analytics could be used to help encourage NEUs to actively monitor and observe their activity for greater online awareness. The guidance developed through the course of this work can help practitioners develop tools that could help NEUs better understand their online actions, with the aim to result in safer experiences when acting online.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Are we managing the risk of sharing cyber situational awareness? A UK Public Sector case study 我们是否在管理共享网络态势感知的风险?英国公共部门案例研究
M. Davies, Menisha Patel
{"title":"Are we managing the risk of sharing cyber situational awareness? A UK Public Sector case study","authors":"M. Davies, Menisha Patel","doi":"10.1109/CyberSA.2016.7503292","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503292","url":null,"abstract":"The development of effective cyber situational awareness, that makes a significant contribution to the decision making process around information risk management, is an important goal for organizations across all sectors. The sharing of such information between and within organizations is seen as a key security enabler. This paper considers a case study of a UK Public Sector organization. The aim is to establish if the decision to share cyber situational awareness has been taken from an information risk management perspective, and to examine whether or not the organization is suitably well-placed, to manage the consequences of information loss, occurring as a result of the sharing process.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Situation aware intrusion recovery policy in WSNs 基于情景感知的wsn入侵恢复策略
Eliana Stavrou, A. Pitsillides
{"title":"Situation aware intrusion recovery policy in WSNs","authors":"Eliana Stavrou, A. Pitsillides","doi":"10.1109/CyberSA.2016.7503285","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503285","url":null,"abstract":"Wireless Sensor Networks (WSNs) have been gaining tremendous research attention the last few years as they support a broad range of applications in the context of the Internet of Things. WSN-driven applications greatly depend on the sensors' observations to support decision-making and respond accordingly to reported critical events. In case of compromisation, it is vital to recover compromised WSN services and continue to operate as expected. To achieve an effective restoration of compromised WSN services, sensors should be equipped with the logic to take recovery decisions and self-heal. Self-healing is challenging as sensors should be aware of a variety of aspects in order to take effective decisions and maximize the recovery benefits. So far situation awareness has not been actively investigated in an intrusion recovery context. This research work formulates situation aware intrusion recovery policy design guidelines in order to drive the design of new intrusion recovery solutions that are operated by an adaptable policy. An adaptable intrusion recovery policy is presented taking into consideration the proposed design guidelines. The evaluation results demonstrate that the proposed policy can address advanced attack strategies and aid the sensors to recover the network's operation under different attack situations and intrusion recovery requirements.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"43 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Internet discussion forums: Maximizing choice in health-seeking behaviour during public health emergencies 互联网论坛:在突发公共卫生事件中最大限度地选择求医行为
J. Cole, D. Kleine, C. Watkins
{"title":"Internet discussion forums: Maximizing choice in health-seeking behaviour during public health emergencies","authors":"J. Cole, D. Kleine, C. Watkins","doi":"10.1109/CyberSA.2016.7503283","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503283","url":null,"abstract":"This paper proposes a new approach to improving our understanding of the suitability of internet discussion forums for use by health information seekers. We consider in particular their potential use during public health emergencies when access to conventional experts and healthcare professionals may be constrained. We explore potential benefits and challenges of crowdsourcing information on health issues in online environments through the context of Computer Science theories of Collective Intelligence [1, 2], which explore how members of a group - particularly when networked by computer systems - can reach a better solution than an individual working alone. We ask if online discussion forums can provide the `clever mechanism' Surowiecki [3] proposed is necessary to harness such potential group wisdom, and help health information seekers to identify the best option or `maximized choice' from a set of less-than-ideal choices [4], thus adding value to information seeking during public health emergencies.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114531515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge 论网络威胁情报分析员开发和利用隐性威胁与防御知识的协作实践
Jan M. Ahrend, M. Jirotka, K. Jones
{"title":"On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge","authors":"Jan M. Ahrend, M. Jirotka, K. Jones","doi":"10.1109/CyberSA.2016.7503279","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503279","url":null,"abstract":"While the need for empirical investigations of cybersecurity analysts' collaborative work practices is widely acknowledged, research efforts are fairly limited. This paper aims to provide empirical evidence to support a deeper consideration for the seemingly intangible collaborative practices that situational awareness in cybersecurity relies on and add to our understanding of what it means to “do” threat intelligence. In particular, it aims to unpack the informal forms of collaboration and coordination at work that build tacit knowledge about threat actors and defenders and that span across time, people and tools to inform the translation of threat information into actionable threat intelligence. In-depth semi-structured interviews and diary studies are conducted at three cyber threat intelligence service providers (N=5) and analyzed using thematic analysis. This paper introduces the concept of Threat and Defence Knowledge, tacit knowledge that analysts within an organization form over time and utilize through informal ways of becoming aware of this knowledge, making it available and correlating it. We find that a lack of accessibility to knowledge about relevant threat and defence factors can reduce analysts' effectiveness at arriving at actionable threat intelligence and hence reduce the ability to be alerted in advance about cyber threats, to contain damage and obtain situational awareness. Perceived and potential shortcomings of the existing processes and tools are presented, and practices to circumvent the existing systems investigated and implications for design are considered.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122732517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol 对WPA2-PSK重认证后的四向握手进行增强,以应对去认证后的暴力攻击,提出了一种新的重认证协议
M. Ghanem, Deepthi N. Ratnayake
{"title":"Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol","authors":"M. Ghanem, Deepthi N. Ratnayake","doi":"10.1109/CyberSA.2016.7503286","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503286","url":null,"abstract":"The nature of wireless network transmission and the emerging attacks are continuously creating or exploiting more vulnerabilities. Despite the fact that the security mechanisms and protocols are constantly upgraded and enhanced, the Small Office/Home Office (SOHO) environments that cannot afford a separate authentication system, and generally adopt the IEEE 802.11 Wi-Fi-Protected-Access-2/Pre-Shared-Key (WPA2-PSK) are still exposed to some attack categories such as de-authentication attacks that aim to push wireless client to re-authenticate to the Access Point (AP) and try to capture the keys exchanged during the handshake to compromise the network security. This kind of attack is impossible to detect or prevent in spite of having an Intrusion Detection and Prevention System (IDPS) installed on the client or on the AP, especially when the attack is not repetitive and is targeting only one client. This paper proposes a novel method which can mitigate and eliminate the risk of exposing the PSK to be captured during the re-authentication process by introducing a novel re-authentication protocol relying on an enhanced four-way handshake which does not require any hardware upgrade or heavy-weight cryptography affecting the network flexibility and performances.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129747734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cyber attacks and maritime situational awareness evidence from Japan and Taiwan 来自日本和台湾的网络攻击和海上态势感知证据
J. Burton
{"title":"Cyber attacks and maritime situational awareness evidence from Japan and Taiwan","authors":"J. Burton","doi":"10.1109/CyberSA.2016.7503295","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503295","url":null,"abstract":"This paper argues that cyber-attacks are increasingly being seen as a threat to maritime situational awareness in the Asia Pacific region, and highlights how the Japanese and Taiwanese governments have been developing both offensive and defensive cyber operations to ameliorate vulnerabilities in their naval fleets vis-a-vis their respective relationships with China. The paper begins by exploring traditional understandings of maritime situational awareness and how changes in Information and Communications Technology (ICT) have transformed the maritime strategic environment in recent decades. The paper moves on to explore how countries in the region, including China, the US, Japan and Taiwan are developing new capabilities in this area and new military doctrine to avoid disruptions to maritime operations. The final section of the paper presents a forward looking analysis of how cyber-attacks could affect military responses to territorial dispute in the South China Sea in particular, and the normative dangers of cyber militarization in the naval domain. The paper is based on field research conducted in Japan and Taiwan in 2014/15.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Building an effective and efficient continuous web application security program 建立一个有效和高效的持续web应用程序安全程序
Ma Bang, Himanshu Saraswat
{"title":"Building an effective and efficient continuous web application security program","authors":"Ma Bang, Himanshu Saraswat","doi":"10.1109/CyberSA.2016.7503287","DOIUrl":"https://doi.org/10.1109/CyberSA.2016.7503287","url":null,"abstract":"Most of organizations today either have some kind of web application security program or trying to build/enhance. However most of these programs are not getting expected results to organization, neither long lasting nor able to deliver value in continuous and efficient manner and also unable to enhance mind set of developers to build/design secure web applications. A strong application security program involves built in security into Application Development Lifecycle (S-SDLC), developing security guidelines and standards, creating awareness and security trainings, execute effective web application security assessment, establishing meaniningful security dashboards for each stake holder from executives, directors, program managers to developers.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"937 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信