Chen Zhong, J. Yen, Peng Liu, R. Erbacher, Renee Etoty, C. Garneau
{"title":"ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis","authors":"Chen Zhong, J. Yen, Peng Liu, R. Erbacher, Renee Etoty, C. Garneau","doi":"10.1109/COGSIMA.2015.7108193","DOIUrl":null,"url":null,"abstract":"Efficiency and interference shielding are critical factors for conducting successful cognitive task analysis (CTA) of cyber-attack analysis. To achieve this goal, a tool, named ARSCA, is developed to work with an analyst during a cyber-attack analysis task and to capture the main elements in his/her cognitive process. ARSCA conducts process tracing in a way that reduces the study time and the workload needed for analysts and does not distract the analysts from executing their tasks. ARSCA has been tested in an experiment with a simulated cyber-attack analysis task. Thirteen professional analysts and seventeen doctoral students specializing in cyber security are recruited. We evaluate the captured traces and the participants' feedbacks on working with ARSCA.","PeriodicalId":373467,"journal":{"name":"2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COGSIMA.2015.7108193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
Efficiency and interference shielding are critical factors for conducting successful cognitive task analysis (CTA) of cyber-attack analysis. To achieve this goal, a tool, named ARSCA, is developed to work with an analyst during a cyber-attack analysis task and to capture the main elements in his/her cognitive process. ARSCA conducts process tracing in a way that reduces the study time and the workload needed for analysts and does not distract the analysts from executing their tasks. ARSCA has been tested in an experiment with a simulated cyber-attack analysis task. Thirteen professional analysts and seventeen doctoral students specializing in cyber security are recruited. We evaluate the captured traces and the participants' feedbacks on working with ARSCA.