[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1071752.1071797acmotherconferencesArticle/Chapter ViewAbstractPublication PageswisictConference Proceedingsconference-collections
Article

Sensor fusion and automatic vulnerability analysis

Published: 03 January 2005 Publication History

Abstract

Security analysis of networked computing systems continues to present a challenge. The growing complexity of network and computing systems, the increasing sophistication of computer attacks, and the limited supply of security specialist make automated security solutions a necessity. A number of independent solutions are often suggested for a system and then implemented as independent sensors. Little work has been done in fusing sensor outputs in a meaningful way in order to recognize an attack in progress in time to mitigate its impact.

References

[1]
National Research Council, Computer Science and Telecommunications Board, "Cybersecurity today and tomorrow: pay now or pay later", National Academy Press, Washington D.C., Prepublication Edition http://lab.nap.edu/html/cybersecurity
[2]
J. Farrell, R. R. Henning, K. L. Fox, M. Knepper, "A vulnerability categorization", presented at the 3rd Annual International Systems Security Engineering Association (ISSEA) Conference, March 13--15, 2002.
[3]
R. R. Henning, K. L. Fox, "The network vulnerability tool (nvt) -- a system vulnerability visualization architecture", Proceedings of the 22nd National Information Systems Security Conference, Volume 1, 1999, pp. 97--111.
[4]
Siraj, A., Vaughn, R. and Bridges, S. "Decision Making for Network Health Assessment in an Intelligent Intrusion Detection System Architecture", International Journal of Information Technology and Decision Making (IT&DM) Vol.3, No.2, June 2004.
[5]
Siraj, A., Vaughn, R., and Bridges S., "Decision Making for Network Health Assessment in an Intelligent Intrusion Detection System Architecture", Proceedings of the Hawaii International Conference on System Sciences (HICSS-37), Waikoloa, Hawaii, January 5--8, 2004.
[6]
R. R. Henning, K. L. Fox, J. T. Farrell, C. C. Miller and E. P. Meijer, Network Visualization Tool Program -- Final Scientific & Technical Report, Harris Corporation, Melbourne, FL, June 1999.
[7]
Fox, K, Henning, R., Farrell, J. and Vaughn, R. "A Prototype Next Generation Information Assurance Tool -A Data Fusion Model for Information Systems Defense-", Proceeding of the 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2003), vol 1, pp. 284--289, Orlando, FL, July 27--30, 2003.
[8]
R. Axelrod, Structured Decision: The Cognitive Maps of Political Elites, Princeton University Press Princeton, NJ.
[9]
B. Kosko, "Fuzzy Cognitive Maps", International Journal of Man-Machine Studies, vol. 24, 1986, pp. 65--75.
[10]
B. Kosko, Fuzzy Thinking: The New Science of Fuzzy Logic. Hymerion, NY, 1993

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WISICT '05: Proceedings of the 4th international symposium on Information and communication technologies
January 2005
256 pages
ISBN:1595931694

Publisher

Trinity College Dublin

Publication History

Published: 03 January 2005

Check for updates

Author Tags

  1. computer security
  2. intrusion detection
  3. sensor fusion
  4. vulnerability analysis

Qualifiers

  • Article

Conference

WISICT '05
WISICT '05: Information and communication technologies
January 3 - 6, 2005
Cape Town, South Africa

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 552
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media