Enabling cyber situation awareness, impact assessment, and situation projection
@article{Lewis2008EnablingCS, title={Enabling cyber situation awareness, impact assessment, and situation projection}, author={L. Lewis and G. Jakobson and J. Buford}, journal={MILCOM 2008 - 2008 IEEE Military Communications Conference}, year={2008}, pages={1-6} }
In the paper we focus on (i) an assessment of impact on missions or business processes resulting from cyber attacks and (ii) the subsequent projection of further possible attacks and corresponding impact assessments. [...] Key Method The nodes of a constraint network contain variables with accompanying certainty factors characterizing aspects of missions, services, IT assets, network connections, known vulnerabilities, safeguards, cyber alerts, attack categories, and partial models of complex stepping-stone or…Expand Abstract
14 Citations
Cyber Defense and Situational Awareness
- Engineering, Computer Science
- Advances in Information Security
- 2014
- 53
Novel Data Reduction Techniques In Large-Scale Network Infrastructures Through Impact And Vulnerability Assessment
- Computer Science
- 2012
- 1
- PDF
Toward Linking Information Assurance and Air and Missile Defense Mission Metrics
- Computer Science
- 2010 IEEE Second International Conference on Social Computing
- 2010
- PDF
References
SHOWING 1-10 OF 16 REFERENCES
Security Situation Assessment and Response Evaluation (SSARE)
- Computer Science
- Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
- 2001
- 33
Strategies comparison for game theoretic cyber situational awareness and impact assessment
- Computer Science
- 2007 10th International Conference on Information Fusion
- 2007
- 19
- PDF
An Impact Assessment Model for Distributed Adaptive Security Situation Assessment
- Engineering
- 2005
- 2
- PDF
Computer Network Defence Situational Awareness Information Requirements
- Engineering
- MILCOM 2006 - 2006 IEEE Military Communications conference
- 2006
- 12
Terrain and behavior modeling for projecting multistage cyber attacks
- Computer Science
- 2007 10th International Conference on Information Fusion
- 2007
- 23
- PDF
Real-time multistage attack awareness through enhanced intrusion alert clustering
- Engineering
- MILCOM 2005 - 2005 IEEE Military Communications Conference
- 2005
- 29
- PDF
Asset Valuation Technique for Network Management and Security
- Computer Science
- Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06)
- 2006
- 14
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams
- Computer Science
- VizSEC '06
- 2006
- 36
- PDF
Comprehensive approach to intrusion detection alert correlation
- Computer Science
- IEEE Transactions on Dependable and Secure Computing
- 2004
- 515
- PDF