Cognitive security: A comprehensive study of cognitive science in cybersecurity

被引:39
作者
Andrade, Roberto O. [1 ]
Yoo, Sang Guun [1 ]
机构
[1] Escuela Politec Nacl, Fac Ingn Sistemas, Quito, Ecuador
关键词
Cognitive security; Cognitive science; Situation awareness; Cyber operations; INTRUSION RESPONSE;
D O I
10.1016/j.jisa.2019.06.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, IoT, cloud computing, mobile and social networks are generating a transformation in social processes. Nevertheless, this technological change rise to new threats and security attacks that produce new and complex cybersecurity scenarios with large volumes of data and different attack vectors that can exceeded the cognitive skills of security analysts. In this context, cognitive sciences can enhance the cognitive processes, which can help to security analysts to establish actions in less time and more efficiently within cybersecurity operations. This works presents a cognitive security model that integrates technological solutions such as Big Data, Machine Learning, and Support Decision Systems with the cognitive processes of security analysts used to generate knowledge, understanding and execution of security response actions. The model considers alternatives to establish the automation process in the execution of cognitive tasks defined in the cyber operations processes and includes the analyst as the central axis in the processes of validation and decision making through the use of MAPE-K, OODA and Human in the Loop. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 51 条
  • [1] Green synthesis of Xanthan gum/Methionine-bentonite nanocomposite for sequestering toxic anionic dye
    Ahmad, Rais
    Mirza, Anam
    [J]. SURFACES AND INTERFACES, 2017, 8 : 65 - 72
  • [2] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [3] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [4] MAPE-K-Based Approach for Security @ Runtime
    Amoud, Mohamed
    Roudies, Ounsa
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SCIENCE, TECHNOLOGY AND ENGINEERING (SWSTE 2016), 2016, : 138 - 140
  • [5] Andrade R, 2018, 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P478, DOI 10.1109/CCWC.2018.8301745
  • [6] [Anonymous], COMPORTAMIENTO HUMAN
  • [7] [Anonymous], 2016, SUST DEV GOALS 2016
  • [8] [Anonymous], RES METHODS CYBERSEC
  • [9] [Anonymous], 2016, NATURAL COMPUTING SE, DOI DOI 10.1007/978.3.319.39675.0.2
  • [10] [Anonymous], IEEE T EMERG TOP COM