A collaborative approach to situational awareness for cybersecurity

@article{Mathews2012ACA,
  title={A collaborative approach to situational awareness for cybersecurity},
  author={M. L. Mathews and Paul Halvorsen and A. Joshi and Timothy W. Finin},
  journal={8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)},
  year={2012},
  pages={216-222}
}
  • M. L. Mathews, Paul Halvorsen, +1 author Timothy W. Finin
  • Published 2012
  • Computer Science
  • 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
  • Traditional intrusion detection and prevention systems have well known limitations that decrease their utility against many kinds of attacks. Creating a new system that collaboratively combines information from traditional and nontraditional sensors to produce new, relevant signatures is one way to deal with these limitations. In this paper, we present a framework that uses this collaborative approach, as well as the details for a network traffic based classifier that shows promise for… CONTINUE READING

    Figures and Topics from this paper.

    Cyber situational awareness - A systematic review of the literature
    • 166
    • PDF
    Processing Tweets for Cybersecurity Threat Awareness
    • 8
    • PDF
    Detecting Botnets using a Collaborative Situational-aware IDPS
    • 4
    • PDF
    Detecting data exfiltration by integrating information across layers
    • 4
    • PDF
    Early Warning Systems for Cyber Defence
    • 3
    • PDF
    Avoiding inconsistencies in the Security Content Automation Protocol
    • 7
    • PDF
    Situation awareness in the Internet of Things
    • 3

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 22 REFERENCES
    A Knowledge-Based Approach to Intrusion Detection Modeling
    • 64
    • PDF
    On Inferring Application Protocol Behaviors in Encrypted Network Traffic
    • 235
    • PDF
    Bayesian Neural Networks for Internet Traffic Classification
    • 450
    • PDF
    Modeling Computer Attacks: An Ontology for Intrusion Detection
    • 181
    • PDF
    Extracting Information about Security Vulnerabilities from Web Text
    • 59
    • PDF
    Accurate Classification of the Internet Traffic Based on the SVM Method
    • 114
    • Highly Influential
    • PDF
    Resource Description Framework
    • 705
    Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior
    • 8
    Using DAML + OIL to classify intrusive behaviours
    • J E F F R E Y U N D E R C O F F E R, A N U P A M J O, J O H N P I N K S T O N
    • 2004
    • 7
    • PDF