The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014 6th International Conference on Cyber Conflict (CyCon 2014) 2014
DOI: 10.1109/cycon.2014.6916402
|View full text |Cite
|
Sign up to set email alerts
|

Operational data classes for establishing situational awareness in cyberspace

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Many traditional military topics have been expanded and applied into the cyberspace domain [7]. These include the concept of situational awareness [8], key terrain [9], and defense in depth [10]. A basic military concept that has received extension theoretical review is maneuver [5], [11], [12].…”
Section: A Military Maneuver and Cyberspacementioning
confidence: 99%
“…Many traditional military topics have been expanded and applied into the cyberspace domain [7]. These include the concept of situational awareness [8], key terrain [9], and defense in depth [10]. A basic military concept that has received extension theoretical review is maneuver [5], [11], [12].…”
Section: A Military Maneuver and Cyberspacementioning
confidence: 99%
“…Adaptation of Situational Awareness to the cyber domain is not straightforward, due to several characteristics in its operations, adversaries, and the observability of the activities. Earlier works, including [22,44,60], discussed several challenges that are unique in enabling CSA. This section extracts prior works as well as our renewed perspectives, and present a summary of the contemporary challenges for CSA.…”
Section: Contemporary Challenges For Csamentioning
confidence: 99%
“…Variety and Volatility -The variety of data opens challenges in homogenizing data from different sources and of different types, as well as due to the heterogeneous attack behaviors/tactics and network protocol and system configurations. In term of homogenization, typical security operations desire central processing, e.g., in a data cloud, which require proper metrics and alert thresholds [22]. Data refinement and normalization is necessary to transform into a common format for effective data synthesis [22] while maintaining the original characteristics and dealing with data duplication, unreliable sources, and errors.…”
Section: The Data Perspectivementioning
confidence: 99%
See 1 more Smart Citation
“…MITRE emphasizes the importance of critical assets to key cyber terrain stating that "assets in operational environments are typically identified and their criticality determined via a mission impact analysis or business impact analysis" [8]. Dressler et al [13] broaden the identification of key cyber terrain to include "all critical information, systems, and infrastructure; whether owned by the organization or used in transit by its information". From Franz' definition of key cyber terrain, MITRE and Dressler's discussions of critical assets as part of key cyber terrain tie directly into "mission essential war fighting functions" [11].…”
Section: A Key Cyber Terrainmentioning
confidence: 99%