A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing

F Skopik, G Settanni, R Fiedler - Computers & Security, 2016 - Elsevier
The Internet threat landscape is fundamentally changing. A major shift away from hobby
hacking toward well-organized cyber crime can be observed. These attacks are typically …

Towards automated cyber decision support: A case study on network segmentation for security

N Wagner, CŞ Şahin, M Winterrose… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
Network segmentation is a security measure that partitions a network into sections or
segments to restrict the movement of a cyber attacker and make it difficult for her to gain …

[HTML][HTML] A network security situation prediction model based on wavelet neural network with optimized parameters

H Zhang, Q Huang, F Li, J Zhu - Digital Communications and Networks, 2016 - Elsevier
The security incidents ion networks are sudden and uncertain, it is very hard to precisely
predict the network security situation by traditional methods. In order to improve the …

Queryable semantics to detect cyber-attacks: A flow-based detection approach

AF AlEroud, G Karabatis - IEEE transactions on systems, man …, 2016 - ieeexplore.ieee.org
Cyber-attacks continue to increase worldwide, leading to significant loss or misuse of
information assets. Most of the existing intrusion detection systems rely on per-packet …

Data integrity attacks in smart grid wide area monitoring

S Paudel, P Smith, T Zseby - … for ICS & SCADA Cyber Security …, 2016 - scienceopen.com
A smart grid requires the implementation of ICT technologies in order to incorporate new
functions into electricity grid monitoring and control. Wide Area Monitoring Systems …

Csc-detector: A system to infer large-scale probing campaigns

E Bou-Harb, C Assi, M Debbabi - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper uniquely leverages unsolicited real darknet data to propose a novel system, CSC-
Detector, that aims at identifying Cyber Scanning Campaigns. The latter define a new …

Effective prioritization of network intrusion alerts to enhance situational awareness

EA Newcomb, RJ Hammell… - 2016 IEEE Conference …, 2016 - ieeexplore.ieee.org
Maintaining situational awareness in dynamic and complex systems, such as information
and communications networks, is essential to protecting assets and increasing mission …

Role of intrusion-detection systems in cyber-attack detection

V Dutt, F Moisan, C Gonzalez - … in Cybersecurity: Proceedings of the AHFE …, 2016 - Springer
Currently, little is known about how defenders' reliance on decision-support technology
influences their decisions. Here, we designed a cyber-security game, where “hackers” …

Survey of network security situation awareness

龚俭, 臧小东, 苏琪, 胡晓艳, 徐杰 - Journal of Software, 2016 - jos.org.cn
随着网络空间安全重要性的不断提高, 网络安全态势感知 (network security situation
awareness, 简称 NSSA) 的研究与应用正在得到更多的关注. NSSA 实现对网络中各种活动的 …

Hierarchical clustering of group behaviors in cyber situation awareness

Y Zhang, L Liao, C Xu, M Yang - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
In cyber situation awareness, top-down simulation for group behaviors of attacks are
unsupported to simulate unknown cliques of attackers. To solve this issue, we believe that …