Active Perception for Cyber Intrusion Detection and Defense

被引:1
|
作者
Goldman, Robert P. [1 ]
Burstein, Mark [1 ]
Benton, J. [1 ]
Kuter, Ugur [1 ]
Mueller, Joseph [1 ]
Robertson, Paul [2 ]
Cerys, Dan [2 ]
Hoffman, Andreas [2 ]
Bobrow, Rusty [3 ]
机构
[1] SIFT LLC, 319 N First Ave, Minneapolis, MN 55401 USA
[2] DOLL Labs, Lexington, MA 02421 USA
[3] Bobrow Computat Intelligence LLC, Boston, MA USA
关键词
D O I
10.1109/SASOW.2015.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest to inform decisions about cyber defense actions. By identifying critical network assets, the organization's mission measures interest (and value of information). This model enables the system to follow leads from inexpensive, inaccurate alerts with targeted use of expensive, accurate sensors. This allows the deployment of sensors to build structured interpretations of situations. From these, an organization can meet mission-centered decision-making requirements with calibrated responses proportional to the likelihood of true detection and degree of threat.
引用
收藏
页码:92 / 101
页数:10
相关论文
共 50 条
  • [1] Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems
    Faysel, Mohammad A.
    Haque, Syed S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (07): : 316 - 325
  • [2] Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems
    Wang, Kun
    Du, Miao
    Yang, Dejun
    Zhu, Chunsheng
    Shen, Jian
    Zhang, Yan
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2016, 16 (01)
  • [3] Cyber Situation Awareness with Active Learning for Intrusion Detection
    McElwee, Steven
    Cannady, James
    2019 IEEE SOUTHEASTCON, 2019,
  • [4] Human-in-the-Loop Cyber Intrusion Detection Using Active Learning
    Kim, Yeongwoo
    Dan, Gyorgy
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8658 - 8672
  • [5] US Policy on Active Cyber Defense
    Flowers, Angelyn
    Zeadally, Sherali
    JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2014, 11 (02) : 289 - 308
  • [6] Framework and principles for active cyber defense
    Denning, Dorothy E.
    COMPUTERS & SECURITY, 2014, 40 : 108 - 113
  • [7] An Intrusion and Defense Testbed in a Cyber-Power System Environment
    Hong, Junho
    Wu, Shinn-Shyan
    Stefanov, Alexandru
    Fshosha, Ahmed
    Liu, Chen-Ching
    Gladyshev, Pavel
    Govindarasu, Manimaran
    2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,
  • [8] Modeling of Intrusion and Defense for Assessment of Cyber Security at Power Substations
    Chen, Ying
    Hong, Junho
    Liu, Chen-Ching
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 2541 - 2552
  • [9] Active Cyber Defense as a Preemptive Self-Defense Measure
    Gokce, Yasir
    STRATEGIC CYBER DEFENSE: A MULTIDISCIPLINARY PERSPECTIVE, 2017, 48 : 120 - 128
  • [10] A Testbed for SCADA Cyber Security and Intrusion Detection
    Singh, Prateek
    Garg, Saurabh
    Kumar, Vinod
    Saquib, Zia
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,