NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium 2020
DOI: 10.1109/noms47738.2020.9110327
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Situation Awareness via IP Flow Monitoring

Abstract: Cyber situation awareness has been recognized as a vital requirement for effective cyber defense. Cyber situation awareness allows cybersecurity operators to identify, understand, and anticipate incoming threats. Achieving and maintaining the cyber situation awareness is a challenging task given the continuous evolution of the computer networks, increasing volume and speeds of the data in a network, and rising number of threats to network security. Our work contributes to the continuous evolution of cyber situ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Hence, identifying various network vulnerabilities impact assessments will provide knowledge of future impact projection. Prior studies have discussed different techniques to improve cyber situational awareness [7], [24], [25], mainly for analyzing the trends in network traffic. With the evolution of grid networks, there are increasing security threats due to the expanding volume of data transmitted on the grid.…”
Section: Networkmentioning
confidence: 99%
“…Hence, identifying various network vulnerabilities impact assessments will provide knowledge of future impact projection. Prior studies have discussed different techniques to improve cyber situational awareness [7], [24], [25], mainly for analyzing the trends in network traffic. With the evolution of grid networks, there are increasing security threats due to the expanding volume of data transmitted on the grid.…”
Section: Networkmentioning
confidence: 99%
“…Analytic hierarchy process [ 31 , 32 ], along with D-S evidence theory [ 33 ], was utilized to fuse multi-source data, and eventually streamline the cyber-situational assessment process. Finally, T. Jirsik et al in [ 34 , 35 ] approached situational awareness in a more traditional manner. They introduced a new and enhanced way to analyze network flows by taking advantage of the integrated meta-data that IPFIX [ 36 ] provides, resulting in a more detailed understanding of the network while eliminating the need for extra parsers, like syslog, due to the extra, non-network data from IPFIX.…”
Section: State Of the Artmentioning
confidence: 99%
“…Accurate identification of IP flows and proper management of lambda connections are important tasks to achieve the desired move. Two approaches are currently used for that [17]: conventional management and GMPLS signaling. The former is characterized by a centralized management entity such as a human manager or an automated management process, that oversees establishing lambda-connections and deciding which IP flows should be moved to the optical level.…”
Section: Lambda Architecture Explainedmentioning
confidence: 99%