2015
DOI: 10.1109/msp.2015.30
|View full text |Cite
|
Sign up to set email alerts
|

Gaining an Edge in Cyberspace with Advanced Situational Awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(24 citation statements)
references
References 5 publications
0
24
0
Order By: Relevance
“…Besides, the spontaneous and continuous attention of many researchers to this field has made the researches on cybersecurity the top hot issue. In order to fully understand the research status of network security situational awareness, this paper firstly searched and reviewed articles on this topic in the past 10 years in the core database in September 2017, and sorted out a total of 10 large citations of review literature [16,[37][38][39][40][41][42][43][44][45]. Based on the actor-network theory, Kopylec et al [37] explored the critical relationship between physical and network infrastructure, and demonstrated the results of situational awareness through visual cascading.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides, the spontaneous and continuous attention of many researchers to this field has made the researches on cybersecurity the top hot issue. In order to fully understand the research status of network security situational awareness, this paper firstly searched and reviewed articles on this topic in the past 10 years in the core database in September 2017, and sorted out a total of 10 large citations of review literature [16,[37][38][39][40][41][42][43][44][45]. Based on the actor-network theory, Kopylec et al [37] explored the critical relationship between physical and network infrastructure, and demonstrated the results of situational awareness through visual cascading.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
“…Tadda and Salerno [16], Giacobe [40], and Schreiber-Ehle and Koch [42] inquired into the application process of JDL model in the field of situational awareness, especially in literature [40] for the favorable induction and summary of the data source information at level 0/1 in JDL model. In addition, Klein et al [41] and Vincent [45] et al applied the OODA loop model [15] to the network situational awareness and some stages in the model are prerequisites for others. Through such a class decision paradigm, the various activities in network defense are integrated.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
“…Extended OODA Loop as an activity network (based on [46] and [47]) featuring added Learning and Narratives Loops • Orient (recognise and become aware of the situation based on patterns in data using analytics and producing a narrative to what is actually happening); • Decide (retrieve existing-, or design / plan new patterns of behaviour); • Act (execute behaviour, then observe outcome, etc.). Note that although progress in sensor networks and the IoT can provide data on a massive scale, it is impossible to observe everything; therefore, there is no certainty that what is observed is relevant and can be analysed to obtain all information necessary or useful situational awareness [48] and effective decision and action. Only through 'post-mortem' learning a BMS can acquire timely and effective analytics supporting the above mentioned capability.…”
Section: Learning Loopmentioning
confidence: 99%
“…The characteristics of large data analysis technology, such as mass storage, parallel computation and efficient query, provide the basis for the research of large-scale network security situation awareness [2]. We can use the big data analysis technique to analyze the information of many network logs.…”
Section: Introductionmentioning
confidence: 99%