Humans and automation: Augmenting security operation centers
J Tilbury, S Flowerday - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
The continuous integration of automated tools into security operation centers (SOCs)
increases the volume of alerts for security analysts. This amplifies the risk of automation bias …
increases the volume of alerts for security analysts. This amplifies the risk of automation bias …
Automated cyber defence: A review
S Vyas, J Hannay, A Bolton, PP Burnap - arXiv preprint arXiv:2303.04926, 2023 - arxiv.org
Within recent times, cybercriminals have curated a variety of organised and resolute cyber
attacks within a range of cyber systems, leading to consequential ramifications to private and …
attacks within a range of cyber systems, leading to consequential ramifications to private and …
Towards human-ai teaming to mitigate alert fatigue in security operations centres
Security Operations Centres (SOCs) play a pivotal role in defending organisations against
evolving cyber threats. They function as central hubs for detecting, analysing, and …
evolving cyber threats. They function as central hubs for detecting, analysing, and …
[HTML][HTML] Automation Bias and Complacency in Security Operation Centers
J Tilbury, S Flowerday - Computers, 2024 - mdpi.com
The volume and complexity of alerts that security operation center (SOC) analysts must
manage necessitate automation. Increased automation in SOCs amplifies the risk of …
manage necessitate automation. Increased automation in SOCs amplifies the risk of …
[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …
highlight their inevitability and the impossibility of completely protecting the integrity of …
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response
R Kremer, PN Wudali, S Momiyama, T Araki… - arXiv preprint arXiv …, 2023 - arxiv.org
Security orchestration, automation, and response (SOAR) systems ingest alerts from security
information and event management (SIEM) system, and then trigger relevant playbooks that …
information and event management (SIEM) system, and then trigger relevant playbooks that …
[PDF][PDF] THE RATIONALITY OF AUTOMATION BIAS IN SECURITY OPERATION CENTERS.
J Tilbury, S Flowerday - Journal of Information System Security, 2024 - researchgate.net
Abstract Security Operation Centers (SOCs) comprise people, processes, and technology
and are responsible for protecting their respective organizations against any form of cyber …
and are responsible for protecting their respective organizations against any form of cyber …
CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement Learning
M Cheah, J Stone, P Haubrick, S Bailey… - … on Research in …, 2023 - Springer
Autonomous decision making for cyber-defence in operational situations is desirable but
challenging. This is due to the nature of operational technology (because of its cyber …
challenging. This is due to the nature of operational technology (because of its cyber …
A Formal Model of Security Controls' Capabilities and Its Applications to Policy Refinement and Incident Management
Enforcing security requirements in networked information systems relies on security controls
to mitigate the risks from increasingly dangerous threats. Configuring security controls is …
to mitigate the risks from increasingly dangerous threats. Configuring security controls is …
Adaptive Response Technology for Threats in Power IoT Terminals Based on Reinforcement Learning
C Sun, X Sun, Y Wang, H Dai, F Zou… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
The power Internet of Things (IoT) terminal is an integral part of the power system and faces
a complex network attack scenario. When the power system detects a network attack, it …
a complex network attack scenario. When the power system detects a network attack, it …