Towards a Theoretical Framework for an Active Cyber Situational Awareness Model

被引:0
作者
Al-Shamisi, Ahmed
Louvieris, Panos
Al-Mualla, Mohammed [1 ]
Mihajlov, Martin [2 ]
机构
[1] Brunel Univ, Sch Informat Syst Comp & Math, Def & Cyber Secur Res Grp, Uxbridge, Middx, England
[2] Ss Cyril & Methodius Univ, E Business Dept, Skopje, Macedonia
来源
PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING, (IWSSIP 2016) | 2016年
关键词
situational awareness; cyber situational awareness; active situational awareness model; DATA FUSION; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While the mechanism and scope of cyberspace is progressing on a daily basis, risk factors and the ability to process cyberspace data in less time and using less effort are proving to be major roadblocks to achieve the desired outcomes. The defensive methods currently applied to counter these evolving attacks are not sufficient due to their preventive and reactive nature so an active posture is required. The passive natures of existing Situational Awareness (SA) models imply that they cannot enhance cyber SA in a world where there are new developments every day. The research activity in this paper focused on defining a new approath towards ensuring cyber security. We propose an Active Situational Awareness Model (ASAM) as a theoretical model that enhances the quality of cyber situational awareness. The model proposes a concept that conforms to the military stratagems of Sun Tzu, where operators always engage attackers directly by deploying active intelligence-gathering techniques in order to create new knowledge.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 40 条
[1]   SITUATION AWARENESS AND THE COGNITIVE MANAGEMENT OF COMPLEX-SYSTEMS [J].
ADAMS, MJ ;
TENNEY, YJ ;
PEW, RW .
HUMAN FACTORS, 1995, 37 (01) :85-104
[2]  
Addinall R., 2012, SECURITY DEFENCE NAT, P457
[3]  
ALBERTS D, 2000, NETWORK CTR WARFARE
[4]  
Barford P, 2010, ADV INFORM SECUR, V46, P3, DOI 10.1007/978-1-4419-0140-8_1
[5]  
Beaver J. M., 2011, VISUALIZATION TECHNI, V8019
[6]  
Bedny G., 1999, International Journal of Cognitive Ergonomics, V3, P63, DOI [10.1207/s15327566ijce0301_5, DOI 10.1207/S15327566IJCE0301_5]
[7]   The Omnibus model: A new model of data fusion? [J].
Bedworth, M ;
O'Brien, J .
IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2000, 15 (04) :30-36
[8]   Defining and computing a value based cyber-security measure [J].
Ben Aissa, Anis ;
Abercrombie, Robert K. ;
Sheldon, Frederick T. ;
Mili, Ali .
INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) :433-453
[9]   JDL level 5 fusion model "user refinement" issues and applications in group tracking [J].
Blasch, EP ;
Plano, S .
SIGNAL PROCESSING, SENSOR FUSION, AND TARGET RECOGNITION XI, 2002, 4729 :270-279
[10]  
Boyd J. R., 1987, DISCOURSE WIN LOSING