A Data-Driven Approach to Security Science

被引:0
|
作者
Iyer, Ravishankar K. [1 ,2 ,3 ]
机构
[1] Univ Illinois, Coordinated Sci Lab, Urbana, IL 61801 USA
[2] Univ Illinois, Dept Elect & Comp Engn, Urbana, IL 61801 USA
[3] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
来源
7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012) | 2012年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In security more than in other computing disciplines, professionals depend heavily on rapid analysis of voluminous streams of data gathered by a combination of network-, file-, and system-level monitors. The data are used both to maintain a constant vigil against attacks and compromises on a target system and to improve the monitoring itself. While the focus of the security engineer is on ensuring operational security, it is our experience that the data are a gold mine of information that can be used to develop a greater fundamental insight and hence a stronger scientific basis for building, monitoring, and analyzing future secure systems. In order to facilitate timely and accurate detection and response to attacks several challenges must be addressed: 1. Challenge of navigating through a vast amount of data generated by security monitoring tools. 2. Challenge of conducting timely forensics and providing tools to extract and correlate information about the attack and its progress. 3. Challenge of validating and benchmarking the security monitoring infrastructure and the system resiliency to accidental errors and malicious attacks.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] A data-driven approach for embedded security
    Saputra, H
    Ozturk, O
    Vijaykrishnan, N
    Kandemir, M
    Brooks, R
    IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: NEW FRONTIERS IN VLSI DESIGN, 2005, : 104 - 109
  • [2] Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach
    Natella, Roberto
    Ceccarelli, Andrea
    Ficco, Massimo
    2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 410 - 415
  • [3] Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach
    Tarahomi, Sousan
    Holz, Ralph
    Sperotto, Anna
    2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 346 - 349
  • [4] An efficient security data-driven approach for implementing risk assessment
    Shameli-Sendi, Alireza
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [5] Data-driven predictions in the science of science
    Clauset, Aaron
    Larremore, Daniel B.
    Sinatra, Roberta
    SCIENCE, 2017, 355 (6324) : 477 - 480
  • [6] CIAM: A Data-Driven Approach for Selecting and Prioritizing Security Controls
    Llanso, Thomas
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 91 - 98
  • [7] Data-driven science policy
    Fitzpatrick, Susan M.
    ISSUES IN SCIENCE AND TECHNOLOGY, 2016, 32 (04) : 17 - 18
  • [8] Data-Driven Science Policy
    Borner, Katy
    ISSUES IN SCIENCE AND TECHNOLOGY, 2016, 32 (03) : 26 - 28
  • [9] A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
    Thuraisingham, Bhavani
    Kantarcioglu, Murat
    Hamlen, Kevin
    Khan, Latifur
    Finin, Tim
    Joshi, Anupam
    Oates, Tim
    Bertino, Elisa
    PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 1 - 10
  • [10] Data-driven public health security
    Li, Cuiping
    Wu, Linhuan
    Shu, Chang
    Bao, Yiming
    Ma, Juncai
    Song, Shuhui
    CHINESE SCIENCE BULLETIN-CHINESE, 2024, 69 (09): : 1156 - 1163