Enabling cyber situation awareness, impact assessment, and situation projection

  title={Enabling cyber situation awareness, impact assessment, and situation projection},
  author={L. Lewis and G. Jakobson and J. Buford},
  journal={MILCOM 2008 - 2008 IEEE Military Communications Conference},
  • L. Lewis, G. Jakobson, J. Buford
  • Published 2008
  • Computer Science
  • MILCOM 2008 - 2008 IEEE Military Communications Conference
  • In the paper we focus on (i) an assessment of impact on missions or business processes resulting from cyber attacks and (ii) the subsequent projection of further possible attacks and corresponding impact assessments. [...] Key Method The nodes of a constraint network contain variables with accompanying certainty factors characterizing aspects of missions, services, IT assets, network connections, known vulnerabilities, safeguards, cyber alerts, attack categories, and partial models of complex stepping-stone or…Expand Abstract
    14 Citations
    Geographical visualization for security risk and mission impact assessment
    • PDF
    Visual Cyber Situational Awareness for Critical Infrastructures
    • 8
    Cyber-ARGUS - A mission assurance framework
    • 3
    A Framework for Event Prioritization in Cyber Network Defense
    • 12
    • PDF
    Metrics of Security
    • 37
    • PDF
    Decision Support for Mission-Centric Cyber Defence
    • 1
    • PDF
    Cyber Defense and Situational Awareness
    • 53
    Toward Linking Information Assurance and Air and Missile Defense Mission Metrics
    • PDF


    Security Situation Assessment and Response Evaluation (SSARE)
    • 33
    Strategies comparison for game theoretic cyber situational awareness and impact assessment
    • 19
    • PDF
    Computer Network Defence Situational Awareness Information Requirements
    • 12
    Terrain and behavior modeling for projecting multistage cyber attacks
    • 23
    • PDF
    Real-time multistage attack awareness through enhanced intrusion alert clustering
    • 29
    • PDF
    Asset Valuation Technique for Network Management and Security
    • L. Beaudoin, P. Eng
    • Computer Science
    • Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06)
    • 2006
    • 14
    Comprehensive approach to intrusion detection alert correlation
    • 515
    • PDF