Willkommen, schön sind Sie da!
Logo Ex Libris

Cyber Situational Awareness

  • Kartonierter Einband
  • 252 Seiten
(0) Erste Bewertung abgeben
Bewertungen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the c... Weiterlesen
20%
192.00 CHF 153.60
Print on demand - Exemplar wird für Sie besorgt.
Kein Rückgaberecht!
Bestellung & Lieferung in eine Filiale möglich

Beschreibung

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: • Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. • Lack of capability to monitor certain microscopic system/attack behavior. • Limited capability to transform/fuse/distill information into cyber intelligence. • Limited capability to handle uncertainty. • Existing system designs are not very friendly to Cyber Situational Awareness.

Covers fundamental challenges facing this research community

Identifies promising solutions paths

Includes case studies based on real world examples



Klappentext

Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question can be well answered, is greatly dependent upon the cyber situational awareness capability of enterprises.

Cyber Situational Awareness: Issues and Research is an edited volume contributed by worldwide cyber security experts. This book seeks to establish state of the art in cyber situational awareness area to set course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive system, and decision science areas will elaborate on the fundamental challenges facing the research community and identify promising solutions paths. Case studies based on real world examples are provided throughout this book.

Cyber Situational Awareness: Issues and Research is designed for a professional audience composed of government workers and practitioners working in the field of cyber security. Advanced-level students and researchers studying computer science will also find this book useful, as secondary text or a reference book.



Inhalt
Chapter 1: Introduction to Cyber Situational Awareness Lead authors: Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Chapter 2: Information Fusion for Cyber Situational Awareness Lead author: George Tadda, AFRL --------------------------------------------------------------------- Section: Macroscopic Cyber Situational Awareness -------------------------------------------------------------------- Chapter 3: Cyber Situational Awareness through Network Telescopes Lead authors: Vern Paxson (Berkeley), P. Barford (Wisconsin) Chapter 4: Using Honeynets to Gain Internet Situational Awareness Lead author: Mark Dacier, EURECOM Chapter 5: Internet-Scale Cyber Threat Analysis Lead author: Phillip Porras, SRI International -------------------------------------------------------------------- Section: Enterprise Cyber Situational Awareness -------------------------------------------------------------------- Chapter 6: Topological Vulnerability Analysis Lead author: Sushil Jajodia Chapter 7: Intrusion Detection and Alert Correlation Lead author: Peng Ning Chapter 8: Damage assessment and intrusion response Lead author: Peng Liu ------------------------------------------------------------------------- Section: Microscopic Cyber Situational Awareness -------------------------------------------------------------------------- Chapter 9: Microscopic Cyber Situational Awareness: Needs, Challenges and Solutions Lead author: Dawn Song, Berkeley {Backup author: Peng Liu} Chapter 10: Intrusion Back-tracking and Forensics Lead author: Peter Chen, Michigan Chapter 11: System Call Level Cyber Situational Awareness Lead authors: Jha & Griffin ----------------------------------------- Section: The Data Dimension ------------------------------------------ Chapter 12: A Data Stream Analysis Approach to Cyber Situational Awareness Lead author: Sharad Mehrotra, UC Irvine ----------------------------------------------------------------------- Section: Decision Making & Leaning Aspects ------------------------------------------------------------------------ Chapter 13: RPD-inspired Hypothesis Reasoning for Cyber Situation Awareness Lead authors: John Yen, Penn State University Chapter 14: Automated Human Analyst Situation Awareness Cognition Lead author: unknown {candidate author: Mike McNeese, Penn State University) Chapter 15: Uncertainty and Risk Management in Cyber Situation Awareness Lead author: unknown

Produktinformationen

Titel: Cyber Situational Awareness
Untertitel: Issues and Research
Editor:
EAN: 9781461424758
ISBN: 978-1-4614-2475-8
Format: Kartonierter Einband
Herausgeber: Springer, Berlin
Genre: Informatik
Anzahl Seiten: 252
Gewicht: 408g
Größe: H235mm x B235mm x T155mm
Jahr: 2012
Auflage: 2010

Weitere Produkte aus der Reihe "Advances in Information Security"