Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3407023.3407062acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Public Access

SoK: contemporary issues and challenges to enable cyber situational awareness for network security

Published: 25 August 2020 Publication History

Abstract

Cyber situational awareness is an essential part of cyber defense that allows the cybersecurity operators to cope with the complexity of today's networks and threat landscape. Perceiving and comprehending the situation allow the operator to project upcoming events and make strategic decisions. In this paper, we recapitulate the fundamentals of cyber situational awareness and highlight its unique characteristics in comparison to generic situational awareness known from other fields. Subsequently, we provide an overview of existing research and trends in publishing on the topic, introduce front research groups, and highlight the impact of cyber situational awareness research. Further, we propose an updated taxonomy and enumeration of the components used for achieving cyber situational awareness. The updated taxonomy conforms to the widely-accepted three-level definition of cyber situational awareness and newly includes the projection level. Finally, we identify and discuss contemporary research and operational challenges, such as the need to cope with rising volume, velocity, and variety of cybersecurity data and the need to provide cybersecurity operators with the right data at the right time and increase their value through visualization.

References

[1]
Mohamed Abdlhamed, Kashif Kifayat, Qi Shi, and William Hurst. 2017. Intrusion Prediction Systems. Springer International Publishing, 155--174.
[2]
Abdulghani Ali Ahmed and Noorul Ahlami Kamarul Zaman. 2017. Attack Intention Recognition: A Review. IJ Network Security 19, 2 (2017), 244--250.
[3]
Massimiliano Albanese, Ermanno Battista, and Sushil Jajodia. 2015. A Deception Based Approach for Defeating OS and Service Fingerprinting. In IEEE Conference on Communications and Network Security (CNS). IEEE, Florence, Italy, 317--325.
[4]
Massimiliano Albanese and Sushil Jajodia. 2014. Formation of awareness. Advances in Information Security 62 (2014), 47--62.
[5]
Massimiliano Albanese and Sushil Jajodia. 2017. A Graphical Model to Assess the Impact of Multi-Step Attacks. Journal of Defense Modeling and Simulation: Applications, Methodology, Technology (apr 2017).
[6]
Massimiliano Albanese, Sushil Jajodia, and Steven Noel. 2015. Methods and systems for determining hardening strategies. Patent No. US 9,203,861 B2, Filed Jun 21, 2013, Issued Dec 1, 2015.
[7]
Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin, Sushil Jajodia, Somesh Jha, Jason Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, Cliff Wang, and John Yen. 2010. Cyber SA: Situational awareness for cyber defense. Advances in Information Security 46 (2010), 3--13.
[8]
Václav Bartoš, Martin Žádník, Sheikh Mahbub Habib, and Emmanouil Vasilomanolakis. 2019. Network entity characterization and attack prediction. Future Generation Computer Systems 97 (2019), 674 -- 686.
[9]
G. Bedny and D. Meister. 1999. Theory of Activity and Situation Awareness. International Journal of Cognitive Ergonomics 3, 1 (1999), 63--72.
[10]
Joel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, and Stefan Varga. 2016. Using cyber defense exercises to obtain additional data for attacker profiling. In IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. IEEE, 37--42.
[11]
Joel Brynielsson, Ulrik Franke, and Stefan Varga. 2016. Cyber Situational Awareness Testing. In Combatting Cybercrime and Cyberterrorism. Springer, Cham, 209--233.
[12]
Kavitha Chandrasekar, Gillian Cleary, Orla Cox, Hon Lau, Benjamin Nahorney, Brigid O Gorman, Dick O'Brien, Scott Wallace, Paul Wood, and Candid Wueest. 2017. Internet Security Threat Report. https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
[13]
Cisco. 2017. Cisco Visual Networking Index: Forecast and Methodology, 2016-2021. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.pdf
[14]
Edward Colbert, Alexander Kott, Lawrence P Knachel, and Daniel T Sullivan. 2017. Modeling Cyber Physical War Gaming. Technical Report. US Army Research Laboratory Aberdeen Proving Ground United States. 46 pages. http://www.dtic.mil/docs/citations/AD1038105
[15]
Edward Colbert, Daniel T Sullivan, and Alexander Kott. 2017. Cyber-Physical War Gaming. (2017). arXiv:1708.07424
[16]
Edward J. M. Colbert and Alexander Kott. 2016. Cyber-security of SCADA and Other Industrial Control Systems. Advances in Information Security, Vol. 66. Springer International Publishing.
[17]
Zachary A. Collier, Mahesh Panwar, Alexander A. Ganin, Alexander Kott, and Igor Linkov. 2016. Security Metrics in Industrial Control Systems. In Cyber-security of SCADA and Other Industrial Control Systems, Advances in Information Security. Vol. 66. Springer, Cham, 167--185.
[18]
Commonwealth of Australia. 2009. Cyber Security Strategy.
[19]
Ian A. Cooke, Alexander Scott, Kasia Sliwinska, Novia Wong, Soham V. Shah, Jihun Liu, and David Schuster. 2018. Toward Robust Models of Cyber Situation Awareness. In Advances in Intelligent Systems and Computing, Vol. 782. Springer, Cham, 127--137.
[20]
Department of the Army. 2014. FM 3-38: Cyber Electromagnetic Activities.
[21]
Jean-Pierre Dijcks. 2012. Oracle: Big data for the enterprise. http://www.oracle.com/us/products/database/big-data-for-enterprise-519135.pdf
[22]
Judson Dressler, Calvert L. Bowen, William Moody, and Jason Koepke. 2014. Operational data classes for establishing situational awareness in cyberspace. In 2014 6th International Conference On Cyber Conflict (CyCon 2014). IEEE, 175--186.
[23]
Haitao Du, Daniel F Liu, Jared Holsopple, and Shanchieh Jay Yang. 2010. Toward Ensemble Characterization and Projection of Multistage Cyber Attacks. In 2010 Proceedings of 19th International Conference on Computer Communications and Networks. IEEE.
[24]
Haitao Du, Changzhou Wang, Tao Zhang, Shanchieh Jay Yang, Jai Choi, and Peng Liu. 2015. Cyber Insider Mission Detection for Situation Awareness. In Studies in Computational Intelligence. Vol. 563. Springer, Cham, 201--217.
[25]
Haitao Du and Shanchieh Jay Yang. 2014. Probabilistic Inference for Obfuscated Network Attack Sequences. In Proceedings of IEEE/ISIF International Conference on Dependable Systems and Networks.
[26]
Mica R. Endsley. 1988. Situation awareness global assessment technique (SAGAT). In Aerospace and Electronics Conference, 1988. NAECON 1988., Proceedings of the IEEE 1988 National. IEEE, 789--795.
[27]
Mica R. Endsley. 1995. Measurement of Situation Awareness in Dynamic Systems. Human Factors 37, 1 (1995), 65--84.
[28]
Mica R. Endsley. 1995. Theoretical underpinnings of situation awareness: A critical review. In Proceedings of the International Conference on Analysis and Measurement of Situation Awareness. 24.
[29]
Mica R. Endsley. 1995. Toward a Theory of Situation Awareness in Dynamic Systems. Human Factors 37, 1 (1995), 32--64.
[30]
Mica R. Endsley. 2015. Situation Awareness Misconceptions and Misunderstandings. Journal of Cognitive Engineering and Decision Making 9, 1 (2015), 4--32.
[31]
Antti Evesti, Teemu Kanstrén, Tapio Frantti, Teemu Kanstren, and Tapio Frantti. 2017. Cybersecurity Situational Awareness Taxonomy. In 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE.
[32]
Federal Ministry of the Interior. 2011. Cyber Security Strategy for Germany. https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?_blob=publicationFile
[33]
Ulrik Franke and Joel Brynielsson. 2014. Cyber situational awareness - A systematic review of the literature. Computers & Security 46 (2014), 18--31.
[34]
Ivo Friedberg, Florian Skopik, and Roman Fiedler. 2015. Cyber situational awareness through network anomaly detection: state of the art and new approaches. e & i Elektrotechnik und Informationstechnik 132, 2 (mar 2015), 101--105.
[35]
Rajesh Ganesan, Ankit Shah, Sushil Jajodia, and Hasan Cam. 2017. A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center. In Network Security Metrics. Springer International Publishing, 177--207.
[36]
Richard D. Gilson. 1995. Special Issue Preface. Human Factors 37, 1 (1995), 3--4.
[37]
Government of Canada. 2010. Canada's Cyber Security Strategy: For a Stronger and More Prosperous Canada. http://publications.gc.ca/collections/collection_2010/sp-ps/PS4-102-2010-eng.pdf
[38]
Roman Graf, Florian Skopik, and Kenny Whitebloom. 2016. A decision support model for situational awareness in National Cyber Operations Centers. In 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA). IEEE, London, UK.
[39]
Vinicius Tavares Guimaraes, Carla Maria Dal Sasso Freitas, Ramin Sadre, Liane Margarida Rockenbach Tarouco, and Lisandro Zambenedetti Granville. 2016. A Survey on Information Visualization for Network and Service Management. IEEE Communications Surveys & Tutorials 18, 1 (2016), 285--323.
[40]
William Heinbockel, Steven Noel, and James Curbo. 2016. Mission Dependency Modeling for Cyber Situational Awareness. In NATO IST-148 Symposium on Cyber Defence Situation Awareness.
[41]
HM Government. 2016. National Cyber Security Strategy 2019-2020. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2016.pdf
[42]
Rick Hofstede, Pavel Čeleda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, and Aiko Pras. 2014. Flow monitoring explained: From packet capture to data analysis with netflow and ipfix. IEEE Communications Surveys & Tutorials 16, 4 (2014), 2037--2064.
[43]
Jared Holsopple, Moises Sudit, Michael Nusinov, Daniel Liu, Haitao Du, and Shanchieh Yang. 2010. Enhancing situation awareness via automated situation assessment. IEEE Communications Magazine 48, 3 (mar 2010), 146--152.
[44]
Jared Holsopple, Moises Sudit, and Shanchieh Jay Yang. 2014. Impact Assessment. In Cyber Defense and Situational Awareness. Springer, Cham, 219--238.
[45]
Ronald Howard. 1966. Information Value Theory. IEEE Transactions on Systems Science and Cybernetics 2, 1 (1966), 22--26.
[46]
Martin Husák. 2020. Prediction of Network Attacks in Collaborative Environment. Doctoral thesis. Masaryk University, Faculty of Informatics. https://is.muni.cz/th/dmpga/
[47]
Martin Husák, Jana Komárková, Elias Bou-Harb, and Pavel Čeleda. 2019. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys Tutorials 21, 1 (Firstquarter 2019), 640--660.
[48]
Sushil Jajodia and Massimiliano Albanese. 2017. An integrated framework for cyber situation awareness. In Theory and Models for Cyber Situation Awareness. Lecture Notes in Computer Science. Vol. 10030. Springer, Cham, 29--46.
[49]
Sushil Jajodia, Peng Liu, Vipin Swarup, and Cliff Wang. 2010. Cyber situational awareness: Issues and Research. Springer US.
[50]
Sushil Jajodia, Steven Noel, Pramod Kalapa, Brian C O'Berry, Michael A Jacobs, Eric B. Robertson, and Robert G. Weierbach. 2011. Network attack modeling, analysis, and response. Patent No. US 7,904,962 B1, Filed Mar 10, 2006, Issued Mar 8, 2011.
[51]
Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, and V. S. Subrahmanian. 2017. A Probabilistic Logic of Cyber Deception. IEEE Transactions on Information Forensics and Security 12, 11 (2017), 2532--2544.
[52]
Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, and Cliff Wang. 2016. Cyber deception: Building the scientific foundation. Springer International Publishing.
[53]
Tomáš Jirsík. 2019. Cyber Situation Awareness via IP Flow Monitoring. Doctoral thesis. Masaryk University, Faculty of Informatics. https://is.muni.cz/th/ejynv/
[54]
Tomáš Jirsík and Pavel Čeleda. 2018. Toward Real-time Network-wide Cyber Situational Awareness. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, Taipei, Taiwan.
[55]
Debra G. Jones and Mica R. Endsley. 1996. Sources of situation awareness errors in aviation. Aviation Space and Environmental Medicine 67, 6 (jun 1996), 507--512.
[56]
Jana Komárková, Martin Husák, Martin Laštovička, and Daniel Tovarňák. 2018. CRUSOE: Data Model for Cyber Situational Awareness. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, Article 36, 10 pages.
[57]
Alexander Kott. 2014. Towards fundamental science of cyber security. Advances in Information Security 55 (2014).
[58]
Alexander Kott. 2015. Science of Cyber Security as a System of Models and Problems. Lemnios 2011 (nov 2015). arXiv:1512.00407
[59]
Alexander Kott and Tarek Abdelzaher. 2014. Resiliency and Robustness of Complex Systems and Networks. Vol. 67. CRC Press, Chapter 5, 67--86.
[60]
Alexander Kott, Cliff Wang, and Robert F. Erbacher. 2014. Cyber defense and situational awareness. Vol. 62. Springer.
[61]
Alexander L. Krall, Michael E. Kuhl, Stephen F. Moskal, and Shanchieh J. Yang. 2016. Assessing the likelihood of cyber network infiltration using rare-event simulation. In 2016 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE.
[62]
Martin Laštovička and Pavel Čeleda. 2017. Situational Awareness: Detecting Critical Dependencies and Devices in a Network. In Security of Networks and Services in an All-Connected World. Springer International Publishing, 173--178.
[63]
Yu-Beng Leau and Selvakumar Manickam. 2015. Network Security Situation Prediction: A Review and Discussion. Springer Berlin Heidelberg, 424--435.
[64]
Nandi O Leslie, Richard E Harang, Lawrence P Knachel, and Alexander Kott. 2017. Statistical models for the number of successful cyber intrusions. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology (jun 2017), 154851291771534.
[65]
Igor Linkov, Daniel A. Eisenberg, Kenton Plourde, Thomas P. Seager, Julia Allen, and Alexander Kott. 2013. Resilience metrics for cyber systems. Environment Systems and Decisions 33, 4 (dec 2013), 471--476.
[66]
Peng Liu, Sushil Jajodia, and Cliff Wang. 2017. Theory and Models for Cyber Situation Awareness. Springer International Publishing.
[67]
William J. Matuszak, Lisa DiPippo, and Yan Lindsay Sun. 2013. CyberSAVe: Situational Awareness Visualization for Cyber Security of Smart Grid Systems. In Proceedings of the Tenth Workshop on Visualization for Cyber Security (VizSec '13). ACM, 25--32.
[68]
James Moffat. 2006. Mathematical modelling of information age conflict. Journal of Applied Mathematics and Decision Sciences 2006 (jul 2006).
[69]
Stephen Moskal and Shanchieh Jay Yang. 2020. Cyberattack Action-Intent-Framework for Mapping Intrusion Observables. arXiv:cs.CR/2002.07838
[70]
Stephen Moskal, Shanchieh Jay Yang, and Michael E. Kuhl. 2018. Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts. In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). 49--54.
[71]
Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, and Steve E Hutchinson. 2012. NSDMiner: Automated discovery of network service dependencies. In Proceedings - IEEE INFOCOM. IEEE, 2507--2515.
[72]
NIST. 2017. Situational Awareness a New Way to Attack Cybersecurity Issues Rather Than Using a System Defense Approach. Technical Report. NIST. http://csrc.nist.gov/cyberframework/rfi_comments/tri-county_electric_cooperative_part2_032613.pdf
[73]
S. Noel, E. Harley, K. H. Tam, M. Limiero, and M. Share. 2016. CyGraph: Graph-Based Analytics and Visualization for Cybersecurity. In Handbook of Statistics. Vol. 35. 117--167.
[74]
Steven Noel and Sushil Jajodia. 2014. Metrics suite for network attack graph analytics. In Proceedings of the 9th Annual Cyber and Information Security Research Conference on - CISR '14. ACM, 5--8.
[75]
Steven Noel and Sushil Jajodia. 2017. A Suite of Metrics for Network Attack Graph Analytics. In Network Security Metrics. Springer International Publishing, 141--176.
[76]
Steven Noel, Sushil Jajodia, Lingyu Wang, and Anoop Singhal. 2010. Measuring Security Risk of Networks Using Attack Graphs. International Journal of Next Generation Computing 1, 1 (2010), 135--147.
[77]
Barack Obama. 2011. International Strategy for Cyberspace. https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[78]
Ahmet Okutan and Shanchieh Jay Yang. 2019. ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense. Cybersecurity 2, 1 (2019), 15.
[79]
Ahmet Okutan, Shanchieh Jay Yang, and Katie McConky. 2017. Predicting Cyber Attacks with Bayesian Networks Using Unconventional Signals. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (CISRC '17). ACM, Article 13, 4 pages.
[80]
Ahmet Okutan, Shanchieh Jay Yang, Katie McConky, and Gordon Werner. 2019. CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags. In 2019 IEEE Conference on Communications and Network Security (CNS). 205--213.
[81]
Michael Ownby and Alexander Kott. 2016. Predicting Enemy's Actions Improves Commander Decision-Making. (jul 2016). arXiv:1607.06759
[82]
Timea Pahi, Maria Leitner, and Florian Skopik. 2017. Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy. 334--345.
[83]
Nadine B. Sarter and David D. Woods. 1991. Situation Awareness: A Critical But Ill-Defined Phenomenon. The International Journal of Aviation Psychology 1, 1 (1991), 45--57.
[84]
Hadi Shiravi, Ali Shiravi, and Ali A. Ghorbani. 2012. A Survey of Visualization Systems for Network Security. IEEE Transactions on Visualization and Computer Graphics 18, 8 (2012), 1313--1329.
[85]
Yegor Shovgenya, Florian Skopik, and Klaus Theuerkauf. 2015. On demand for situational awareness for preventing attacks on the smart grid. In 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE.
[86]
Florian Skopik, Zhendong Ma, Paul Smith, and Thomas Bleier. 2012. Designing a cyber attack information system for national situational awareness. In Communications in Computer and Information Science, Vol. 318. Bonn, Germany, 277--288.
[87]
Kip Smith and Peter A. Hancock. 1995. Situation Awareness Is Adaptive, Externally Directed Consciousness. Human Factors 37, 1 (1995), 137--148.
[88]
Neville A. Stanton, Peter R. G. Chambers, and John Piggott. 2001. Situational awareness and safety. Safety Science 39, 3 (2001), 189 -- 204.
[89]
Statista. 2017. Apple App Store: number of available apps 2017. https://www.statista.com/statistics/263795/number-of-available-apps-in-the-apple-app-store/
[90]
Christopher Sweet, Stephen Moskal, and Shanchieh Jay Yang. 2019. Synthetic Intrusion Alert Generation through Generative Adversarial Networks. In Proceedings of IEEE MILCOM.
[91]
Muhammad Adnan Tariq, Joel Brynielsson, and Henrik Artman. 2014. The security awareness paradox: A case study. In ASONAM 2014 - Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 704--711.
[92]
The MITRE Corporation. 2015. An Overview of MITRE Cyber Situational Awareness Solutions. https://www.mitre.org/sites/default/files/publications/pr-15-2592-overview-of-mitre-cyber-situational-awareness-solutions.pdf
[93]
Rob van der Meulen and Christy Pettey. 2017. Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017. https://www.gartner.com/en/newsroom/press-releases/2017-12-07-gartner-forecasts-worldwide-security-spending-will-reach-96-billion-in-2018
[94]
Lingyu Wang, Massimiliano Albanese, and Sushil Jajodia. 2014. Attack Graph and Network Hardening. Springer International Publishing, 15--22.
[95]
Jonathan Stuart Ward and Adam Barker. 2013. Undefined By Data: A Survey of Big Data Definitions. Commun. ACM 58, 7 (jun 2013), 56--68. arXiv:1309.5821
[96]
Gordon Werner, Shanchieh Yang, and Katie McConky. 2017. Time series forecasting of cyber attack intensity. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research - CISRC '17. ACM.
[97]
David D. Woods. 1988. Tasks, Errors, and Mental Models. Taylor & Francis, Chapter Coping with Complexity: The Psychology of Human Behaviour in Complex Systems, 128--148.
[98]
Shanchieh Jay Yang, Haitao Du, Jared Holsopple, and Moises Sudit. 2014. Attack Projection. Springer International Publishing, 239--261.

Cited By

View all
  • (2024)Evaluation of Cyber Situation Awareness - Theory, Techniques and ApplicationsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670921(1-10)Online publication date: 30-Jul-2024
  • (2024)NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber DefenceProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670914(1-11)Online publication date: 30-Jul-2024
  • (2024)‘We Do Not Have the Capacity to Monitor All Media’: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response TeamsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642368(1-16)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. SoK: contemporary issues and challenges to enable cyber situational awareness for network security

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
      August 2020
      1073 pages
      ISBN:9781450388337
      DOI:10.1145/3407023
      • Program Chairs:
      • Melanie Volkamer,
      • Christian Wressnegger
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 August 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cyber situational awareness
      2. network security
      3. taxonomy

      Qualifiers

      • Research-article

      Funding Sources

      • ERDF
      • NSF

      Conference

      ARES 2020

      Acceptance Rates

      Overall Acceptance Rate 228 of 451 submissions, 51%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)458
      • Downloads (Last 6 weeks)57
      Reflects downloads up to 03 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Evaluation of Cyber Situation Awareness - Theory, Techniques and ApplicationsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670921(1-10)Online publication date: 30-Jul-2024
      • (2024)NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber DefenceProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670914(1-11)Online publication date: 30-Jul-2024
      • (2024)‘We Do Not Have the Capacity to Monitor All Media’: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response TeamsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642368(1-16)Online publication date: 11-May-2024
      • (2024)VTion-PatchTST: Elevated PatchTST model for network security situation predictionComputers and Electrical Engineering10.1016/j.compeleceng.2024.109393118(109393)Online publication date: Aug-2024
      • (2023)Survey of Technology in Network Security Situation AwarenessSensors10.3390/s2305260823:5(2608)Online publication date: 27-Feb-2023
      • (2023)A Survey on Threat Hunting in Enterprise NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2023.329951925:4(2299-2324)Online publication date: Dec-2024
      • (2023)Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection2023 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS59707.2023.10288665(1-6)Online publication date: 2-Oct-2023
      • (2022)Proliferation of Cyber Situational AwarenessSecurity and Communication Networks10.1155/2022/60152532022Online publication date: 1-Jan-2022
      • (2022)Explainability in Cyber Security using Complex Network Analysis: A Brief Methodological OverviewProceedings of the 2022 European Interdisciplinary Cybersecurity Conference10.1145/3528580.3532839(49-52)Online publication date: 15-Jun-2022
      • (2022)From scattered data to actionable knowledge: flexible cyber security reporting in the military domainInternational Journal of Information Security10.1007/s10207-022-00613-721:6(1323-1347)Online publication date: 14-Sep-2022
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media