2015
DOI: 10.4018/978-1-4666-8456-0.ch004
|View full text |Cite
|
Sign up to set email alerts
|

Security Monitoring of the Cyber Space

Abstract: Adversaries are abusing Internet security and privacy services to execute cyber attacks. To cope with these threats, network operators utilize various security tools and techniques to monitor the cyber space. An efficient way to infer Internet threat activities is to collect information from trap-based monitoring sensors. As such, this chapter primarily defines the cyberspace trap-based monitoring systems and their taxonomies. Moreover, it presents the state-of-the-art in terms of research contributions and te… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Yet, the potential damage or destruction of cyber networks and civilian infrastructure by a terror organization with sophisticated cyber capabilities could pose a threat to human life in the future (Che, 2007; Fachkha, 2016; Palasinski and Bowman-Grieve, 2017). Governments may therefore be inclined to respond to cyber threats and conventional terrorist threats with similar policy instruments.…”
Section: Cyberattacks and State Responsesmentioning
confidence: 99%
“…Yet, the potential damage or destruction of cyber networks and civilian infrastructure by a terror organization with sophisticated cyber capabilities could pose a threat to human life in the future (Che, 2007; Fachkha, 2016; Palasinski and Bowman-Grieve, 2017). Governments may therefore be inclined to respond to cyber threats and conventional terrorist threats with similar policy instruments.…”
Section: Cyberattacks and State Responsesmentioning
confidence: 99%
“…Planning and design might require expertise from data scientists, and domain and governance experts. Moreover, participation of a diverse group of actors and stakeholders -including civil society and affected communities -is desirable and "ethics-by-design" and "inclusive AI" approaches could be leveraged in this phase (European Commission, 2020 [11]; Park, 2022 [12]).…”
Section: Actors In the Ai System Lifecycle ("By Whom")mentioning
confidence: 99%
“… Sustainability vs performance: large AI models (in terms of parameters and computational load) generally perform better than smaller 11 ones but require more energy.…”
Section:  Transparency Vs Securitymentioning
confidence: 99%
“…Not like DoS, DDoS exploits the massive useful resource asymmetry between the internet and the victim. By means of its many-to-one attack measurement [10] [13], DDoS can block sufferer off-net thereby its protection level come to be inappropriate.…”
Section: Service Denial Attacksmentioning
confidence: 99%