Proliferation of Cyber Situational Awareness: Today's Truly Pervasive Drive of Cybersecurity

被引:4
作者
Nazir, Hafiz Muhammad Jamsheed [1 ]
Han, Weihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
关键词
SYSTEMS; FRAMEWORK; STATE;
D O I
10.1155/2022/6015253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Situation awareness (SA) issues necessitate a comprehension of present activities, the ability to forecast, what will happen next, and strategies to assess the threat or impact of current internet activities and projections. These SA procedures are universal, domain-independent and can be used to detect cyber intrusions. This study introduces cyber situation awareness (CSA), its origin, conception, aim, and characteristics based on an analysis of function shortages and development requirements. Furthermore, we discussed the CSA research framework and examined the research history, which is the essential aspect, and assessed the present issues of the research as well. The assessment approaches were divided into three methods: mathematics model, knowledge reasoning, and pattern recognition. The study then goes into detail regarding the core idea, assessment procedure, strengths, and weaknesses of novel approaches, and then, it addresses CSA from three perspectives: model, knowledge representation, and assessment methods. Many common approaches are contrasted, and current CSA application research in the realms of security, transmission, survivability, and system evaluation is discussed. Finally, this study summarized the findings of the present from technical and application systems, outlined CSA's future development directions, and provided adversary activities and information that can be used to improve an organization's SA operations.
引用
收藏
页数:16
相关论文
共 65 条
  • [1] Adenusi D, 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
  • [2] Forecasting mid-price movement of Bitcoin futures using machine learning
    Akyildirim, Erdinc
    Cepni, Oguzhan
    Corbet, Shaen
    Uddin, Gazi Salah
    [J]. ANNALS OF OPERATIONS RESEARCH, 2023, 330 (1-2) : 553 - 584
  • [3] Albanese M., 2014, Cybersecurity Systems for Human Cognition Augmentation, P47
  • [4] Machine learning for network application security: Empirical evaluation and optimization
    Aledhari, Mohammed
    Razzak, Rehma
    Parizi, Reza M.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
  • [5] [Anonymous], 2014, BUILDING ONTOLOGY CY
  • [6] Antunes D., 2021, RUSSIAN FEDERATION G, P233, DOI [10.1007/978-3-030-73955-3_12, DOI 10.1007/978-3-030-73955-3_12]
  • [7] Intrusion detection systems and multisensor data fusion
    Bass, T
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 99 - 105
  • [8] Bass T., 1999, P IRIS NAT S SENS DA
  • [9] Bass T., VIRTUALIZED CYBERSPA, DOI [10.13140/RG.2.2.12260.27529, DOI 10.13140/RG.2.2.12260.27529]
  • [10] Cyber Protect: A Situational Awareness Platform
    Bokang, Mangoale
    Pantsi, Phumeza
    Mapimele, Fikile
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 187 - 194