Situational Awareness in Computer Network Defense 2012
DOI: 10.4018/978-1-4666-0104-8.ch009
|View full text |Cite
|
Sign up to set email alerts
|

Information Data Fusion and Computer Network Defense

Abstract: Computer networks no longer simply enable military and civilian operations, but have become vital infrastructures for all types of operations ranging from sensing and command/control to logistics, power distribution, and many other functions. Consequently, network attacks have become weapons of choice for adversaries engaged in asymmetric warfare. Traditionally, data and information fusion techniques were developed to improve situational awareness and threat assessment by combining data from diverse sources, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Gilfix and Crouch's [8] PEEP system is an early network sonification example but Ballora et al [9,10,11] developed the idea to address situational awareness. Using an auditory model of the network packet space they produced a "nuanced soundscape in which unexpected patterns can emerge for experienced listeners".…”
Section: B Sonification For Network Monitoringmentioning
confidence: 99%
“…Gilfix and Crouch's [8] PEEP system is an early network sonification example but Ballora et al [9,10,11] developed the idea to address situational awareness. Using an auditory model of the network packet space they produced a "nuanced soundscape in which unexpected patterns can emerge for experienced listeners".…”
Section: B Sonification For Network Monitoringmentioning
confidence: 99%
“…Literature has begun to emerge in some domains 2 . Since 2002, there have been scholarly works published about Level 5 of the JDL data fusion process model 3,4,5,6 as well as about the domains of sense-making 7 , intelligence 8,9,10 , distributed cognition 11 , risk analysis 12,13,14,15 , collaborative sensing 16 , and situation awareness 17 .…”
Section: Introductionmentioning
confidence: 99%
“…Sound can be comprehended peripherally, enabling monitoring as a non-primary task [11], which may aid busy SOC analysts. Furthermore humans have strong patternrecognition capabilities using sound [12]. Based on the challenges faced by SOCs, the properties that sonification can afford, and interviews with security practitioners working in SOCs, it has been reported that sonified presentations of network-security information have the potential to aid in SOC working practice [13].…”
Section: Introductionmentioning
confidence: 99%