Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning

@inproceedings{Dutt2011CyberSA,
  title={Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning},
  author={Varun Dutt and Young-Suk Ahn and Cleotilde Gonzalez},
  booktitle={DBSec},
  year={2011}
}
In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. A security analyst is in charge of observing the online operations of a corporate network (e.g., an online retail company with an external webserver and an internal fileserver) from threats of random or organized cyber-attacks. The current work describes a cognitive Instance-based Learning (IBL) model of the recognition and comprehension processes of a security analyst in a simple cyber-attack… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

Cybersecurity: Effect of information availability in security games

  • 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)
  • 2016

ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis

  • 2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

Cognition and Technology

  • Cyber Defense and Situational Awareness
  • 2014
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 19 REFERENCES

The Newell Test for a Theory of Mind

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Building a New Instance-Based Learning Modeling Tool (unpublished manuscript in preparation

C. Gonzalez, V. Dutt, C. Lebiere
  • 2011
VIEW 1 EXCERPT

Modeling a robotics operator manager in a tactical battlefield

  • 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)
  • 2011
VIEW 1 EXCERPT

Using Bayesian networks for cyber security analysis

  • 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)
  • 2010
VIEW 2 EXCERPTS

A scalable approach to attack graph generation

  • ACM Conference on Computer and Communications Security
  • 2006
VIEW 1 EXCERPT