Autoimmune Cyber Retaliation Supported by Visual Analytics

Mihai Gabriel Ionita, Victor Valeriu Patriciu

Abstract


As the World Wide Web contains close to 500 exabytes, it is clear that securing it is a very important and difficult task. Security specialists and analysts are faced with challenges regarding the sheer quantity of data which has to be analyzed. As the quantity of data grows, automated analysis within a single piece of equipment is not feasible anymore. This is why security analysts are divided between a dozen of consoles from a dozen of pieces of equipment from different vendors, each with its own standards and rules for representing data. Unfortunately human operators cannot efficiently take decisions based on the output of a dozen consoles, each with a different data representation pattern. This is why the cognitive abilities of a human being to reason analytically have to be used. This can be offered to an operator only with the aid of an interactive visual experience on a single large console.

Keywords


Autoimmune Defense, Cyber-Retaliation, Secure Information Exchange, Security, Visual AnalyticsIntroduction

Full Text:

PDF

References


Wikipedia. Wikipedia. Roman–Persian Wars. [Online] January 6, 2014. https://en.wikipedia.org/wiki/Roman%E2%80%93Persian_Wars.

Moore, David, et al., et al. The Spread of the Sapphire/Slammer Worm. CAIDA.org. [Online] http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.

Kaspersky Lab. "Red October" Diplomatic Cyber Attacks Investigation. Securelist. [Online] https://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation.

NSFOCUS. Analysis of DDoS Attacks on Spamhaus and recommended solution. [Online] http://en.nsfocus.com/SecurityView/Analysis%20of%20DDoS%20Attacks%20on%20Spamhaus%20and%20recommended%20solution-EN-20130510.pdf.

Obama Order Sped Up Wave of Cyberattacks Against Iran. The New York Times. [Online] http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=2&_r=1&seid=auto&smid=tw-nytimespolitics&pagewanted=all.

. The Dawn of Kinetic Cyber. Applegate, Scott D: NATO CCD COE, 2013.

Frei, Stefan. The Known Unknowns: NSS Labs, 2013. ANALYST BRIEF.

Higgins, Kelly Jackson. Hacking The Zero-Day Vulnerability Market. Dark Reading. [Online] December 9, 2013. http://www.darkreading.com/vulnerability/hacking-the-zero-day-vulnerability-marke/240164591.

Proofpoint. Proofpoint Uncovers Internet of Things (IoT) Cyberattack. Proofpoint. [Online] January 16, 2014. http://www.proofpoint.com/about-us/press-releases/01162014.php.

Visual Analytics in the Cyber Security Operations Centre. Dr Rowlingson, Robert, et al.: IST-116 Symposium on Visual Analytics, 2013. STO-MP-IST-116.

Dandurand, Luc and Serrano Serrano, Oscar. Towards Improved Cyber Security Information Sharing. NATO CCD COE Publications. 2013 5th International Conference on Cyber Conflict, 2013.

Valérie Lavigne and Denis Gouin. Applicability of Visual Analytics to Defence and Security Operations. 16th Research and Technology Symposium International Command and Control “Collective C2 in Multinational Civil-Military Operations”

Daniel Keim, Gennady Andrienko, Jean-Daniel Fekete, Carsten Gorg, Jorn Kohlhammer, and Guy Melanlacon .Visual Analytics: Definition, Process, and Challenges. : Information Visualization, LNCS 4950, pp. 154–175, 2008. Springer-Verlag Berlin Heidelberg 2008


Refbacks

  • There are currently no refbacks.


Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)