首页 > 最新文献

2009 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
Terrorist and criminal social network data sharing and integration 恐怖分子和犯罪分子的社交网络数据共享和整合
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137312
Xuning Tang, Christopher C. Yang
Social networks are valuable resources for intelligence and law enforcement force in their investigations when they want to identify suspects, terrorist or criminal subgroups and their communication patterns. However, missing information in a terrorist or criminal social network always diminish the effectiveness of investigation. Sharing and integration of social networks from different agencies helps increasing its effectiveness; however, information sharing is usually forbidden due to the concern of privacy protection. In this paper, we introduce the subgraph generalization and mechanism to integrate generalized information to conduct social network analysis.
社交网络是情报部门和执法部门在调查嫌疑人、恐怖分子或犯罪团伙及其通信模式时的宝贵资源。然而,在恐怖分子或犯罪分子的社会网络中,信息缺失往往会降低侦查的有效性。来自不同机构的社会网络的共享和整合有助于提高其有效性;然而,出于隐私保护的考虑,信息共享通常是被禁止的。在本文中,我们引入了子图泛化和整合泛化信息的机制来进行社会网络分析。
{"title":"Terrorist and criminal social network data sharing and integration","authors":"Xuning Tang, Christopher C. Yang","doi":"10.1109/ISI.2009.5137312","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137312","url":null,"abstract":"Social networks are valuable resources for intelligence and law enforcement force in their investigations when they want to identify suspects, terrorist or criminal subgroups and their communication patterns. However, missing information in a terrorist or criminal social network always diminish the effectiveness of investigation. Sharing and integration of social networks from different agencies helps increasing its effectiveness; however, information sharing is usually forbidden due to the concern of privacy protection. In this paper, we introduce the subgraph generalization and mechanism to integrate generalized information to conduct social network analysis.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Defense against SPIT using community signals 利用社区信号防御 SPIT
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137314
S. Phithakkitnukoon, R. Dantu
Internet Telephony has recently gained popularity. Voice over IP (VoIP) has emerged as an alternative to the current public switched telephone network (PSTN) system due to its cost efficiency. Spam inherently becomes a problem in VoIP networks. In this paper, we present our ongoing research in defending VoIP networks against spam by presenting a new defense mechanism using community signals.
互联网电话最近越来越受欢迎。网络电话(VoIP)因其成本效益而成为当前公共交换电话网(PSTN)系统的替代品。在 VoIP 网络中,垃圾邮件必然会成为一个问题。在本文中,我们介绍了我们正在进行的利用社区信号的新防御机制来防御 VoIP 网络垃圾邮件的研究。
{"title":"Defense against SPIT using community signals","authors":"S. Phithakkitnukoon, R. Dantu","doi":"10.1109/ISI.2009.5137314","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137314","url":null,"abstract":"Internet Telephony has recently gained popularity. Voice over IP (VoIP) has emerged as an alternative to the current public switched telephone network (PSTN) system due to its cost efficiency. Spam inherently becomes a problem in VoIP networks. In this paper, we present our ongoing research in defending VoIP networks against spam by presenting a new defense mechanism using community signals.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research about extracting and analyzing accounting data of company to detect financial fraud 研究提取和分析公司会计数据以检测财务舞弊
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137302
Kimin Seo, J. Choi, Yong-seok Choi, Dong-chan Lee, Sangjin Lee
Numbers of companies are using AMS (Accounting Management System) to manage their accounting data. In the case of large corporations they tend to use ERP (Enterprise Resources Planning), but except them most of companies use AMS to manage their accounting information. In the other words, every company is using some sort of digital data format to manage their accounting data. Therefore, if there is a tool to extract and analyze accounting data to detect any financial fraud, a forensic accountant can use it wisely. This paper introduces about forensic accounting and its related works, and shows a design of forensic accounting tool that could extract accounting data from a company's AMS and analyze them.
许多公司正在使用AMS(会计管理系统)来管理他们的会计数据。在大公司的情况下,他们倾向于使用ERP(企业资源计划),但除了他们之外,大多数公司使用AMS来管理他们的会计信息。换句话说,每个公司都在使用某种数字数据格式来管理他们的会计数据。因此,如果有一种工具可以提取和分析会计数据以检测任何财务欺诈,法务会计师可以明智地使用它。本文介绍了法务会计及其相关工作,并设计了一个法务会计工具,该工具可以从公司的AMS中提取会计数据并对其进行分析。
{"title":"Research about extracting and analyzing accounting data of company to detect financial fraud","authors":"Kimin Seo, J. Choi, Yong-seok Choi, Dong-chan Lee, Sangjin Lee","doi":"10.1109/ISI.2009.5137302","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137302","url":null,"abstract":"Numbers of companies are using AMS (Accounting Management System) to manage their accounting data. In the case of large corporations they tend to use ERP (Enterprise Resources Planning), but except them most of companies use AMS to manage their accounting information. In the other words, every company is using some sort of digital data format to manage their accounting data. Therefore, if there is a tool to extract and analyze accounting data to detect any financial fraud, a forensic accountant can use it wisely. This paper introduces about forensic accounting and its related works, and shows a design of forensic accounting tool that could extract accounting data from a company's AMS and analyze them.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127508842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Intrusion detection based on “Hybrid” propagation in Bayesian Networks 基于贝叶斯网络“混合”传播的入侵检测
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137285
F. Jemili, M. Zaghdoud, M. Ahmed
The goal of a network-based intrusion detection system (IDS) is to identify malicious behaviour that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise causal relationships which can affect attack types. A Bayesian Network (BN) is known as graphical modeling tool used to model decision problems containing uncertainty. In this paper, a BN is used to buidl automatic intrusion detection system based on signature recognition. A major difficulty of this system is that the uncertainty on parameters can have two origins. The first source of uncertainty
基于网络的入侵检测系统(IDS)的目标是识别针对网络及其资源的恶意行为。入侵检测参数众多,在许多情况下,它们表现出不确定和不精确的因果关系,从而影响攻击类型。贝叶斯网络(BN)是一种图形化建模工具,用于对包含不确定性的决策问题进行建模。本文提出了一种基于签名识别的自动入侵检测系统。该系统的一个主要困难是参数的不确定性可以有两个来源。不确定性的第一个来源
{"title":"Intrusion detection based on “Hybrid” propagation in Bayesian Networks","authors":"F. Jemili, M. Zaghdoud, M. Ahmed","doi":"10.1109/ISI.2009.5137285","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137285","url":null,"abstract":"The goal of a network-based intrusion detection system (IDS) is to identify malicious behaviour that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise causal relationships which can affect attack types. A Bayesian Network (BN) is known as graphical modeling tool used to model decision problems containing uncertainty. In this paper, a BN is used to buidl automatic intrusion detection system based on signature recognition. A major difficulty of this system is that the uncertainty on parameters can have two origins. The first source of uncertainty","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131901952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Developing insider attack detection model: A grounded approach 开发内部攻击检测模型:一种基础方法
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137280
Gary Doss, G. Tejay
Insider threats and attacks are a known problem. Within an enterprise it is very difficult to detect and identify insider attacks and abuse against Information Systems. A study was conducted by observing a group of IS security analysts who detect and identify insider attacks. Commonalities and generalizations were made based on the study to create an insider attack detection model. This model will allow other IS security analysts the ability to increase detection of insider attacks and reduce false positives.
内部威胁和攻击是一个已知的问题。在企业内部,检测和识别针对信息系统的内部攻击和滥用是非常困难的。一项研究是通过观察一组检测和识别内部攻击的IS安全分析师进行的。在此基础上,对内部攻击检测模型进行了归纳和总结。这种模式将使其他IS安全分析人员能够增加对内部攻击的检测并减少误报。
{"title":"Developing insider attack detection model: A grounded approach","authors":"Gary Doss, G. Tejay","doi":"10.1109/ISI.2009.5137280","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137280","url":null,"abstract":"Insider threats and attacks are a known problem. Within an enterprise it is very difficult to detect and identify insider attacks and abuse against Information Systems. A study was conducted by observing a group of IS security analysts who detect and identify insider attacks. Commonalities and generalizations were made based on the study to create an insider attack detection model. This model will allow other IS security analysts the ability to increase detection of insider attacks and reduce false positives.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116036182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Assured Information Sharing Life Cycle 确保信息共享生命周期
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137331
Timothy W. Finin, A. Joshi, H. Kargupta, Y. Yesha, J. Sachs, E. Bertino, Ninghui Li, Chris Clifton, Gene Spafford, B. Thuraisingham, Murat Kantarcioglu, A. Bensoussan, N. Berg, L. Khan, Jiawei Han, ChengXiang Zhai, R. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic
This paper describes our approach to assured information sharing. The research is being carried out under a MURI 9Multiuniversiyt Research Initiative) project funded by the Air Force Office of Scientific Research (AFOSR). The main objective of our project is: define, design and develop an Assured Information Sharing Lifecycle (AISL) that realizes the DoD's information sharing value chain. In this paper we describe the problem faced by the Department of Defense and our solution to developing an AISL System.
本文描述了一种保证信息共享的方法。该研究是在空军科学研究办公室(AFOSR)资助的MURI(多大学研究计划)项目下进行的。该项目的主要目标是:定义、设计和开发一个可靠的信息共享生命周期(AISL),实现国防部的信息共享价值链。本文描述了美国国防部面临的问题以及我们开发AISL系统的解决方案。
{"title":"Assured Information Sharing Life Cycle","authors":"Timothy W. Finin, A. Joshi, H. Kargupta, Y. Yesha, J. Sachs, E. Bertino, Ninghui Li, Chris Clifton, Gene Spafford, B. Thuraisingham, Murat Kantarcioglu, A. Bensoussan, N. Berg, L. Khan, Jiawei Han, ChengXiang Zhai, R. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic","doi":"10.1109/ISI.2009.5137331","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137331","url":null,"abstract":"This paper describes our approach to assured information sharing. The research is being carried out under a MURI 9Multiuniversiyt Research Initiative) project funded by the Air Force Office of Scientific Research (AFOSR). The main objective of our project is: define, design and develop an Assured Information Sharing Lifecycle (AISL) that realizes the DoD's information sharing value chain. In this paper we describe the problem faced by the Department of Defense and our solution to developing an AISL System.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116165814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Handling Class Imbalance Problem in Cultural Modeling 处理文化造型中的阶级失衡问题
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137320
Peng Su, W. Mao, D. Zeng, Xiaochen Li, Fei-Yue Wang
Cultural modeling is an emergent and promising research area in social computing. It aims at developing behavioral models of groups and analyzing the impact of culture factors on group behavior using computational methods. Machine learning methods in particular classification, play a central role in such applications. In cultural modeling, it is expected that classifiers yield good performance. However, the performance of standard classifiers is often severely hindered in practice due to the imbalanced distribution of class in cultural data. In this paper, we identify class imbalance problem in cultural modeling domain. To handle the problem, we propose a user involved solution employing the receiver operating characteristic (ROC) analysis for classification algorithms with sampling approaches. Finally, we conduct experiment to verify the effectiveness of the proposed solution.
文化建模是社会计算中一个新兴的、有前景的研究领域。它旨在建立群体行为模型,并利用计算方法分析文化因素对群体行为的影响。机器学习方法,特别是分类,在这些应用中起着核心作用。在文化建模中,期望分类器产生良好的性能。然而,在实践中,由于文化数据中类别分布的不平衡,标准分类器的性能往往受到严重阻碍。在本文中,我们识别了文化建模领域中的阶级失衡问题。为了解决这个问题,我们提出了一个用户参与的解决方案,采用采样方法的分类算法的接收者工作特征(ROC)分析。最后,通过实验验证了所提方案的有效性。
{"title":"Handling Class Imbalance Problem in Cultural Modeling","authors":"Peng Su, W. Mao, D. Zeng, Xiaochen Li, Fei-Yue Wang","doi":"10.1109/ISI.2009.5137320","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137320","url":null,"abstract":"Cultural modeling is an emergent and promising research area in social computing. It aims at developing behavioral models of groups and analyzing the impact of culture factors on group behavior using computational methods. Machine learning methods in particular classification, play a central role in such applications. In cultural modeling, it is expected that classifiers yield good performance. However, the performance of standard classifiers is often severely hindered in practice due to the imbalanced distribution of class in cultural data. In this paper, we identify class imbalance problem in cultural modeling domain. To handle the problem, we propose a user involved solution employing the receiver operating characteristic (ROC) analysis for classification algorithms with sampling approaches. Finally, we conduct experiment to verify the effectiveness of the proposed solution.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126993819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hiding in a virtual world: Using unconventionally installed operating systems 隐藏在虚拟世界中:使用非常规安装的操作系统
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137326
R. Bares
Necessity is the mother of invention, and necessity has produced many software and hardware tools in the realm of computer networking and security to overcome problems encountered in the private and public sector. Unconventionally installed operating systems including virtual machines, operating systems installed on removable media and external storage drives are some recent inventions. These tools have been very useful to network administrators, but they can also be used in ways not intended by their creators in an attempt to mask the activities of a user. This paper will attempt to evaluate the possibility of using these unconventionally installed operating systems in an attempt to hide one's activities from conventional digital forensic tools. This evaluation will be conducted by repeating a series of tests inside a virtual environment, then overwriting the virtual environment flat file and having the host computer imaged and examined by forensic tools.
需要是发明之母,需要在计算机网络和安全领域产生了许多软件和硬件工具,以克服私营和公共部门遇到的问题。非常规安装的操作系统包括虚拟机、安装在可移动媒体和外部存储驱动器上的操作系统是最近的一些发明。这些工具对网络管理员非常有用,但它们也可以以创建者不希望的方式使用,试图掩盖用户的活动。本文将尝试评估使用这些非常规安装的操作系统来试图隐藏传统数字取证工具的活动的可能性。此评估将通过在虚拟环境中重复一系列测试来执行,然后覆盖虚拟环境平面文件,并通过取证工具对主机计算机进行成像和检查。
{"title":"Hiding in a virtual world: Using unconventionally installed operating systems","authors":"R. Bares","doi":"10.1109/ISI.2009.5137326","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137326","url":null,"abstract":"Necessity is the mother of invention, and necessity has produced many software and hardware tools in the realm of computer networking and security to overcome problems encountered in the private and public sector. Unconventionally installed operating systems including virtual machines, operating systems installed on removable media and external storage drives are some recent inventions. These tools have been very useful to network administrators, but they can also be used in ways not intended by their creators in an attempt to mask the activities of a user. This paper will attempt to evaluate the possibility of using these unconventionally installed operating systems in an attempt to hide one's activities from conventional digital forensic tools. This evaluation will be conducted by repeating a series of tests inside a virtual environment, then overwriting the virtual environment flat file and having the host computer imaged and examined by forensic tools.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126783833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Voronoi-based model for emergency planning using sequential-scan algorithms 使用顺序扫描算法的基于voronoi的应急计划模型
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137276
C. Torpelund-Bruin, Ickjai Lee
We propose efficient and effective sequential-scan algorithms for intelligent emergency planning, spatial analysis and disaster decision support through the use of Voronoi Tessellations. We propose a modified distance transform algorithm to include complex primitives (point, line and area), Minkowski metrics, different weights, obstacles and higher-order Voronoi diagrams. Illustrated examples demonstrate the usefulness and robustness of our proposed computation model.
我们提出了高效和有效的顺序扫描算法,通过使用Voronoi tessellation智能应急规划,空间分析和灾害决策支持。我们提出了一种改进的距离变换算法,该算法包括复杂原语(点、线和面积)、Minkowski度量、不同权重、障碍物和高阶Voronoi图。举例说明了我们提出的计算模型的有效性和鲁棒性。
{"title":"A Voronoi-based model for emergency planning using sequential-scan algorithms","authors":"C. Torpelund-Bruin, Ickjai Lee","doi":"10.1109/ISI.2009.5137276","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137276","url":null,"abstract":"We propose efficient and effective sequential-scan algorithms for intelligent emergency planning, spatial analysis and disaster decision support through the use of Voronoi Tessellations. We propose a modified distance transform algorithm to include complex primitives (point, line and area), Minkowski metrics, different weights, obstacles and higher-order Voronoi diagrams. Illustrated examples demonstrate the usefulness and robustness of our proposed computation model.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional requirements of situational awareness in computer network security 计算机网络安全中态势感知的功能需求
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137305
Cyril Onwubiko
The underpinning of situational awareness in computer networks is to identify adversaries, estimate impact of attacks, evaluate risks, understand situations and make sound decisions on how to protect valued assets swiftly and accurately. SA also underscores situation assessment in order to make accurate forecast in dynamic and complex environments. In this paper, situational awareness in computer network security is investigated. Functional attributes of situational awareness in computer network security are discussed: dynamism and complexity, automation, realtime processing, multisource data fusion, heterogeneity, security visualisation, decision control, risk assessment, resolution, forecasting and prediction.
计算机网络中态势感知的基础是识别对手,估计攻击的影响,评估风险,了解情况,并就如何快速准确地保护有价值的资产做出合理的决定。SA还强调态势评估,以便在动态和复杂的环境中做出准确的预测。本文研究了计算机网络安全中的态势感知问题。讨论了计算机网络安全中态势感知的功能属性:动态性和复杂性、自动化、实时处理、多源数据融合、异构性、安全可视化、决策控制、风险评估、解决、预测和预测。
{"title":"Functional requirements of situational awareness in computer network security","authors":"Cyril Onwubiko","doi":"10.1109/ISI.2009.5137305","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137305","url":null,"abstract":"The underpinning of situational awareness in computer networks is to identify adversaries, estimate impact of attacks, evaluate risks, understand situations and make sound decisions on how to protect valued assets swiftly and accurately. SA also underscores situation assessment in order to make accurate forecast in dynamic and complex environments. In this paper, situational awareness in computer network security is investigated. Functional attributes of situational awareness in computer network security are discussed: dynamism and complexity, automation, realtime processing, multisource data fusion, heterogeneity, security visualisation, decision control, risk assessment, resolution, forecasting and prediction.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
期刊
2009 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1