Computer-Aided Human Centric Cyber Situation Awareness

In this chapter, we provide an overview of Cyber Situational Awareness, an emerging research area in the broad field of cyber security, and discuss, at least at a high level, how to gain Cyber Situation Awareness. Our discussion focuses on answering the following questions: What is Cyber Situation Awareness? Why is research needed? What are the current research objectives and inspiring scientific principles? Why should one take a multidisciplinary approach? How could one take an end-to-end holistic approach? What are the future research directions?

[1]  Peng Liu,et al.  Experience-based cyber situation recognition using relaxable logic patterns , 2012, 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support.

[2]  Sushil Jajodia,et al.  Pareto-Optimal Adversarial Defense of Enterprise Systems , 2015, TSEC.

[3]  Tao Xie,et al.  MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis , 2013, USENIX Security Symposium.

[4]  Sushil Jajodia,et al.  Time-efficient and cost-effective network hardening using attack graphs , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).

[5]  S. Hart,et al.  Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research , 1988 .

[6]  Michael D. McNeese,et al.  Capturing human cognition in cyber-security simulations with NETS , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[7]  Fabio Persia,et al.  Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data , 2014, IEEE Transactions on Knowledge and Data Engineering.

[8]  John Yen,et al.  How to use experience in cyber analysis: An analytical reasoning support system , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[9]  Cristian Molinaro,et al.  PADUA: Parallel Architecture to Detect Unexplained Activities , 2014, TOIT.

[10]  Christopher G. Healey,et al.  Visualizations and Analysts , 2014, Cyber Defense and Situational Awareness.

[11]  Mark Ballora,et al.  Using Complex Event Processing (CEP) and vocal synthesis techniques to improve comprehension of sonified human-centric data , 2014, Sensing Technologies + Applications.

[12]  Sushil Jajodia,et al.  On the Accurate Identification of Network Service Dependencies in Distributed Systems , 2012, LISA.

[13]  R. M. Taylor,et al.  Situational Awareness Rating Technique (Sart): The Development of a Tool for Aircrew Systems Design , 2017 .

[14]  Nancy J. Cooke,et al.  Influence of Team Communication and Coordination on the Performance of Teams at the iCTF Competition , 2012 .

[15]  John Yen,et al.  RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis , 2014, 2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA).

[16]  Peng Liu,et al.  An Empirical Study of Web Vulnerability Discovery Ecosystems , 2015, CCS.

[17]  Xiaoyan Sun,et al.  Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model , 2012, 2012 International Conference on Cyber Security.

[18]  John Yen,et al.  Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis , 2017, Theory and Models for Cyber Situation Awareness.

[19]  Peng Liu,et al.  Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[20]  Mica R. Endsley,et al.  Developing a Subjective Shared Situation Awareness Inventory for Teams , 2009 .

[21]  Sushil Jajodia,et al.  NSDMiner: Automated discovery of Network Service Dependencies , 2012, 2012 Proceedings IEEE INFOCOM.

[22]  Cleotilde Gonzalez,et al.  Cyber Situation Awareness , 2013, Hum. Factors.

[23]  H. Gardner The mind's new science: a history of the cognitive revolution , 1985 .

[24]  Sushil Jajodia,et al.  Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance , 2014, Cybersecurity Systems for Human Cognition Augmentation.

[25]  Fabio Persia,et al.  Finding "Unexplained" Activities in Video , 2011, IJCAI.

[26]  Fabio Persia,et al.  Finding Top-kappa Unexplained Activities in Video , 2012 .