Active Perception for Cyber Intrusion Detection and Defense

被引:1
|
作者
Goldman, Robert P. [1 ]
Burstein, Mark [1 ]
Benton, J. [1 ]
Kuter, Ugur [1 ]
Mueller, Joseph [1 ]
Robertson, Paul [2 ]
Cerys, Dan [2 ]
Hoffman, Andreas [2 ]
Bobrow, Rusty [3 ]
机构
[1] SIFT LLC, 319 N First Ave, Minneapolis, MN 55401 USA
[2] DOLL Labs, Lexington, MA 02421 USA
[3] Bobrow Computat Intelligence LLC, Boston, MA USA
关键词
D O I
10.1109/SASOW.2015.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest to inform decisions about cyber defense actions. By identifying critical network assets, the organization's mission measures interest (and value of information). This model enables the system to follow leads from inexpensive, inaccurate alerts with targeted use of expensive, accurate sensors. This allows the deployment of sensors to build structured interpretations of situations. From these, an organization can meet mission-centered decision-making requirements with calibrated responses proportional to the likelihood of true detection and degree of threat.
引用
收藏
页码:92 / 101
页数:10
相关论文
共 50 条
  • [31] Perception of pathogen signals to initiate active defense
    Tani, T
    DELIVERY AND PERCEPTION OF PATHOGEN SIGNALS IN PLANTS, 2001, : 1 - 11
  • [32] Active Learning for Intrusion Detection Systems
    Quang-Vinh Dang
    2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020), 2020, : 382 - 384
  • [33] Using active learning in intrusion detection
    Almgren, M
    Jonsson, E
    17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 88 - 98
  • [35] Intrusion Detection Based on Active Networks
    Huang, Han-Pang
    Yang, Feng-Cheng
    Wang, Ming-Tzong
    Chang, Chia-Ming
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (03) : 843 - 859
  • [36] The neuron security of joint defense for network intrusion detection
    Wu, JS
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 501 - 507
  • [37] A hybrid behavioural-based cyber intrusion detection system
    Adhanom, Alemtsehay
    Melaku, Henock M.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 23 (04) : 473 - 498
  • [38] A Survey of Intrusion Detection Techniques for Cyber-Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    ACM COMPUTING SURVEYS, 2014, 46 (04)
  • [39] ADAPTIVE INTRUSION DETECTION SYSTEM FOR CYBER-MANUFACTURING SYSTEM
    Prasad, Romesh
    Moon, Young
    PROCEEDINGS OF ASME 2021 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION (IMECE2021), VOL 2B, 2021,
  • [40] A Brief Study Of Intrusion Detection Techniques To Overcome Cyber Attacks
    Sharma, Pradeep Kumar
    Gupta, Aman Kumar
    Chakraborty, Debraj
    Mondal, Pritam Kumar
    Banerjee, Santu
    Chakraborty, Kumardeep
    Dey, Drik
    Chakraborty, Rounak
    Das, Debangshu
    Ghoshal, Tuhin
    Sinha, Anirban
    Mondal, Souvik
    Pal, Soumyadeep
    Sharma, Rahul
    Gorai, Shreyash
    Roy, Suvankar
    Das, Bhaswat Jyoti
    Dey, Aniket
    Sarker, Siddhartha
    Saha, Sourav
    Poddar, Rohan
    Saha, Nabanit
    Dubey, Saurav
    Singh, Rohan
    Das, Surajit
    Hazra, Debanik
    Das, Saikat
    2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 354 - 358