Information Management and Sharing for National Cyber Situational Awareness

作者: Florian Skopik , Thomas Bleier , Roman Fiedler

DOI: 10.1007/978-3-658-00333-3_21

关键词:

摘要: ICT has been integrated massively in business processes recent years, thus producing an enormous dependency on these technologies. The potential impact of dependencies (for example if the IT systems are lacking appropriate security levels) remarkable – malfunction or total loss public energy grids,the banking system, supply chains administration can cause economic damage and affect entire nations. This paper describes concepts development a system to improve national situational awareness complex infrastructures which is being carried out Austrian research project CAIS (Cyber Attack Information System). core this consists two methods derived prototypical software implementations: modelling simulation tool for analysing structure large terms their resilience against cyber attacks, analysis evaluation investigation current threat situation networks. particularly focuses distributed anomaly detection evaluation, demonstrates how tools be applied course sophisticated methodology order build information that allows efficient sharing collaborative mitigation threats cyberspace

参考文章(13)
Florian Skopik, Zhendong Ma, Paul Smith, Thomas Bleier, Designing a Cyber Attack Information System for National Situational Awareness Future Security Research Conference. pp. 277- 288 ,(2012) , 10.1007/978-3-642-33161-9_42
Nadine B. Sarter, David D. Woods, Situation Awareness: A Critical But Ill-Defined Phenomenon The International Journal of Aviation Psychology. ,vol. 1, pp. 45- 57 ,(1991) , 10.1207/S15327108IJAP0101_4
George Tadda, John J. Salerno, Douglas Boulware, Michael Hinman, Samuel Gorton, Realizing situation awareness within a cyber environment Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2006. ,vol. 6242, pp. 624204- ,(2006) , 10.1117/12.665763
Thuy T.T. Nguyen, Grenville Armitage, A survey of techniques for internet traffic classification using machine learning IEEE Communications Surveys and Tutorials. ,vol. 10, pp. 56- 76 ,(2008) , 10.1109/SURV.2008.080406
Vulnerability Black Markets: Empirical Evidence and Scenario Simulation hawaii international conference on system sciences. pp. 1- 10 ,(2009) , 10.1109/HICSS.2009.504
Varun Chandola, Arindam Banerjee, Vipin Kumar, Anomaly detection: A survey ACM Computing Surveys. ,vol. 41, pp. 15- ,(2009) , 10.1145/1541880.1541882
Michael J. North, Charles M. Macal, Tutorial on agent-based modeling and simulation winter simulation conference. pp. 2- 15 ,(2005) , 10.5555/1162708.1162712
Mica R. Endsley, Toward a Theory of Situation Awareness in Dynamic Systems Human Factors. ,vol. 37, pp. 32- 64 ,(1995) , 10.1518/001872095779049543
David McKinney, Vulnerability Bazaar ieee symposium on security and privacy. ,vol. 5, pp. 69- 73 ,(2007) , 10.1109/MSP.2007.180