Active Perception for Cyber Intrusion Detection and Defense

被引:1
|
作者
Goldman, Robert P. [1 ]
Burstein, Mark [1 ]
Benton, J. [1 ]
Kuter, Ugur [1 ]
Mueller, Joseph [1 ]
Robertson, Paul [2 ]
Cerys, Dan [2 ]
Hoffman, Andreas [2 ]
Bobrow, Rusty [3 ]
机构
[1] SIFT LLC, 319 N First Ave, Minneapolis, MN 55401 USA
[2] DOLL Labs, Lexington, MA 02421 USA
[3] Bobrow Computat Intelligence LLC, Boston, MA USA
关键词
D O I
10.1109/SASOW.2015.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest to inform decisions about cyber defense actions. By identifying critical network assets, the organization's mission measures interest (and value of information). This model enables the system to follow leads from inexpensive, inaccurate alerts with targeted use of expensive, accurate sensors. This allows the deployment of sensors to build structured interpretations of situations. From these, an organization can meet mission-centered decision-making requirements with calibrated responses proportional to the likelihood of true detection and degree of threat.
引用
收藏
页码:92 / 101
页数:10
相关论文
共 50 条
  • [41] Multi-objective Software Assignment for Active Cyber Defense
    Huang, Chu
    Zhu, Sencun
    Guan, Quanlong
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 299 - 307
  • [42] A comparative study of cyber security intrusion detection in healthcare systems
    Zhang, Yan
    Zhu, Degang
    Wang, Menglin
    Li, Junhan
    Zhang, Jie
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 44
  • [43] A Convolutional Autoencoder Based Method with SMOTE for Cyber Intrusion Detection
    She, Xinyi
    Sekiya, Yuji
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 2565 - 2573
  • [44] Intrusion Detection in Cyber Physical Systems Based on Process Modelling
    Holczer, Tamas
    Gazdag, Andras
    Miru, Gyorgy
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 127 - 135
  • [45] Dynamic Intrusion Detection in Resource-Constrained Cyber Networks
    Liu, Keqin
    Zhao, Qing
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [46] Network Intrusion Detection for Cyber Security on Neuromorphic Computing System
    Alom, Md Zahangir
    Taha, Tarek M.
    2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2017, : 3830 - 3837
  • [47] Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (01) : 199 - 210
  • [48] Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges
    Han, Song
    Xie, Miao
    Chen, Hsiao-Hwa
    Ling, Yun
    IEEE SYSTEMS JOURNAL, 2014, 8 (04): : 1049 - 1059
  • [49] Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense
    Jang, Bumsoon
    Doo, Seokjoo
    Lee, Soojin
    Yoon, Hyunsoo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (04): : 1081 - 1091
  • [50] ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention
    Cui, Xiaohui
    Gasior, Wade
    Beaver, Justin
    Treadwell, Jim
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2012, PT IV, 2012, 7336 : 646 - 653