Active Perception for Cyber Intrusion Detection and Defense

被引:1
|
作者
Goldman, Robert P. [1 ]
Burstein, Mark [1 ]
Benton, J. [1 ]
Kuter, Ugur [1 ]
Mueller, Joseph [1 ]
Robertson, Paul [2 ]
Cerys, Dan [2 ]
Hoffman, Andreas [2 ]
Bobrow, Rusty [3 ]
机构
[1] SIFT LLC, 319 N First Ave, Minneapolis, MN 55401 USA
[2] DOLL Labs, Lexington, MA 02421 USA
[3] Bobrow Computat Intelligence LLC, Boston, MA USA
关键词
D O I
10.1109/SASOW.2015.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest to inform decisions about cyber defense actions. By identifying critical network assets, the organization's mission measures interest (and value of information). This model enables the system to follow leads from inexpensive, inaccurate alerts with targeted use of expensive, accurate sensors. This allows the deployment of sensors to build structured interpretations of situations. From these, an organization can meet mission-centered decision-making requirements with calibrated responses proportional to the likelihood of true detection and degree of threat.
引用
收藏
页码:92 / 101
页数:10
相关论文
共 50 条
  • [21] Behavioral Detection of Scanning Worm in Cyber Defense
    Rasheed, Mohammad M.
    Faaeq, Munadil K.
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 : 214 - 225
  • [22] Cyber Security Analysis and Evaluation for Intrusion Detection Systems
    Abushark, Yoosef B.
    Khan, Asif Irshad
    Alsolami, Fawaz
    Almalawi, Abdulmohsen
    Alam, Md Mottahir
    Agrawal, Alka
    Kumar, Rajeev
    Khan, Raees Ahmad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1765 - 1783
  • [23] On Survivability of Mobile Cyber Physical Systems with Intrusion Detection
    Mitchell, Robert
    Chen, Ing-Ray
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (04) : 1377 - 1391
  • [24] Intrusion Detection System for Cyber-Manufacturing System
    Wu, Mingtao
    Moon, Young B.
    JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING-TRANSACTIONS OF THE ASME, 2019, 141 (03):
  • [25] Cyber intrusion detection by combined feature selection algorithm
    Mohammadi, Sara
    Mirvaziri, Hamid
    Ghazizadeh-Ahsaee, Mostafa
    Karimipour, Hadis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 : 80 - 88
  • [26] On Survivability of Mobile Cyber Physical Systems with Intrusion Detection
    Robert Mitchell
    Ing-Ray Chen
    Wireless Personal Communications, 2013, 68 : 1377 - 1391
  • [27] Alert Correlation for Cyber-Manufacturing Intrusion Detection
    Wu, Mingtao
    Moon, Young
    47TH SME NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE (NAMRC 47), 2019, 34 : 820 - 831
  • [28] Port and address hopping for active cyber-defense
    Shi, Leyi
    Jia, Chunfu
    Lue, Shuwang
    Liu, Zhenhua
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 295 - +
  • [29] Research on end hopping and spreading for active cyber defense
    Shi L.
    Guo H.
    Wen X.
    Li J.
    Cui Y.
    Ma M.
    Sun H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 125 - 135
  • [30] A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion
    Gao, Chungang
    Wang, Yongjie
    Xiong, Xinli
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022