2011 Defense Science Research Conference and Expo (DSR) 2011
DOI: 10.1109/dsr.2011.6026824
|View full text |Cite
|
Sign up to set email alerts
|

From detection to reaction - A holistic approach to cyber defense

Abstract: The cyber defense context includes various activities that are often investigated and discussed individually. The process from the detection of a threat to its eventual treatment clearly resembles other decision-making paradigms. By aligning the cyber defense process to the well-known OODA loop, in which the activities in one phase of the loop are prerequisites for those in other phases, situational awareness with respect to information assurance can be established

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 11 publications
1
3
0
Order By: Relevance
“…Klein, Tolle, and Martini proposed a "holistic approach to Cyber Defense" based on the well-known OODA loop (Observe, Orient, Decide, Act). Cyber defense should align all activities of the organization, and by applying the OODA loop, a continuous process ensues, constantly updating the data and its processing (Klein et al, 2011). The research in this paper supports this goal by providing methods to identify relevant data to be observed and acted on.…”
Section: Manual and Automated Analysis For Situational Awarenesssupporting
confidence: 48%
“…Klein, Tolle, and Martini proposed a "holistic approach to Cyber Defense" based on the well-known OODA loop (Observe, Orient, Decide, Act). Cyber defense should align all activities of the organization, and by applying the OODA loop, a continuous process ensues, constantly updating the data and its processing (Klein et al, 2011). The research in this paper supports this goal by providing methods to identify relevant data to be observed and acted on.…”
Section: Manual and Automated Analysis For Situational Awarenesssupporting
confidence: 48%
“…model is the OODA loop. Originally developed for the military context [11], the OODA loop has been applied in many different areas, including cyber defence [31]. The OODA loop method represents the behaviour of agents in adversarial interactions as a continuous cycle through a four-stage loop in a shared environment, the four stages of the loop being observation (Observe), orientation (Orientation), decision (Decide) and action (Act).…”
Section: Attack and Defence Modelling Frameworkmentioning
confidence: 99%
“…Besides, the spontaneous and continuous attention of many researchers to this field has made the researches on cybersecurity the top hot issue. In order to fully understand the research status of network security situational awareness, this paper firstly searched and reviewed articles on this topic in the past 10 years in the core database in September 2017, and sorted out a total of 10 large citations of review literature [16,[37][38][39][40][41][42][43][44][45]. Based on the actor-network theory, Kopylec et al [37] explored the critical relationship between physical and network infrastructure, and demonstrated the results of situational awareness through visual cascading.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
“…Tadda and Salerno [16], Giacobe [40], and Schreiber-Ehle and Koch [42] inquired into the application process of JDL model in the field of situational awareness, especially in literature [40] for the favorable induction and summary of the data source information at level 0/1 in JDL model. In addition, Klein et al [41] and Vincent [45] et al applied the OODA loop model [15] to the network situational awareness and some stages in the model are prerequisites for others. Through such a class decision paradigm, the various activities in network defense are integrated.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%