Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.
[1]
Xinming Ou,et al.
A scalable approach to attack graph generation
,
2006,
CCS '06.
[2]
Peng Liu,et al.
Using Bayesian networks for cyber security analysis
,
2010,
2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[3]
Xu Chen,et al.
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
,
2008,
OSDI.
[4]
Duminda Wijesekera,et al.
Scalable, graph-based network vulnerability analysis
,
2002,
CCS '02.
[5]
Richard P. Lippmann,et al.
An Annotated Review of Past Papers on Attack Graphs
,
2005
.
[6]
Somesh Jha,et al.
Automated generation and analysis of attack graphs
,
2002,
Proceedings 2002 IEEE Symposium on Security and Privacy.
[7]
Xiaoqi Jia,et al.
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System
,
2009,
2009 Annual Computer Security Applications Conference.
[8]
Xinming Ou,et al.
Uncertainty and Risk Management in Cyber Situational Awareness
,
2010,
Cyber Situational Awareness.
[9]
Sushil Jajodia,et al.
Topological analysis of network attack vulnerability
,
2006,
PST.
[10]
John Yen,et al.
Cyber SA: Situational Awareness for Cyber Defense
,
2010,
Cyber Situational Awareness.