Autoimmune Cyber Retaliation Supported by Visual Analytics

Authors

  • Mihai Gabriel Ionita Military Technical Academy
  • Victor Valeriu Patriciu Military Technical Academy

Keywords:

Autoimmune Defense, Cyber-Retaliation, Secure Information Exchange, Security, Visual AnalyticsIntroduction

Abstract

As the World Wide Web contains close to 500 exabytes, it is clear that securing it is a very important and difficult task. Security specialists and analysts are faced with challenges regarding the sheer quantity of data which has to be analyzed. As the quantity of data grows, automated analysis within a single piece of equipment is not feasible anymore. This is why security analysts are divided between a dozen of consoles from a dozen of pieces of equipment from different vendors, each with its own standards and rules for representing data. Unfortunately human operators cannot efficiently take decisions based on the output of a dozen consoles, each with a different data representation pattern. This is why the cognitive abilities of a human being to reason analytically have to be used. This can be offered to an operator only with the aid of an interactive visual experience on a single large console.

Author Biographies

Mihai Gabriel Ionita, Military Technical Academy

Faculty of Military Information and Electronic Systems

Victor Valeriu Patriciu, Military Technical Academy

Faculty of Military Information and Electronic Systems

References

Wikipedia. Wikipedia. Roman–Persian Wars. [Online] January 6, 2014. https://en.wikipedia.org/wiki/Roman%E2%80%93Persian_Wars.

Moore, David, et al., et al. The Spread of the Sapphire/Slammer Worm. CAIDA.org. [Online] http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.

Kaspersky Lab. "Red October" Diplomatic Cyber Attacks Investigation. Securelist. [Online] https://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation.

NSFOCUS. Analysis of DDoS Attacks on Spamhaus and recommended solution. [Online] http://en.nsfocus.com/SecurityView/Analysis%20of%20DDoS%20Attacks%20on%20Spamhaus%20and%20recommended%20solution-EN-20130510.pdf.

Obama Order Sped Up Wave of Cyberattacks Against Iran. The New York Times. [Online] http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=2&_r=1&seid=auto&smid=tw-nytimespolitics&pagewanted=all.

. The Dawn of Kinetic Cyber. Applegate, Scott D: NATO CCD COE, 2013.

Frei, Stefan. The Known Unknowns: NSS Labs, 2013. ANALYST BRIEF.

Higgins, Kelly Jackson. Hacking The Zero-Day Vulnerability Market. Dark Reading. [Online] December 9, 2013. http://www.darkreading.com/vulnerability/hacking-the-zero-day-vulnerability-marke/240164591.

Proofpoint. Proofpoint Uncovers Internet of Things (IoT) Cyberattack. Proofpoint. [Online] January 16, 2014. http://www.proofpoint.com/about-us/press-releases/01162014.php.

Visual Analytics in the Cyber Security Operations Centre. Dr Rowlingson, Robert, et al.: IST-116 Symposium on Visual Analytics, 2013. STO-MP-IST-116.

Dandurand, Luc and Serrano Serrano, Oscar. Towards Improved Cyber Security Information Sharing. NATO CCD COE Publications. 2013 5th International Conference on Cyber Conflict, 2013.

Valérie Lavigne and Denis Gouin. Applicability of Visual Analytics to Defence and Security Operations. 16th Research and Technology Symposium International Command and Control “Collective C2 in Multinational Civil-Military Operations”

Daniel Keim, Gennady Andrienko, Jean-Daniel Fekete, Carsten Gorg, Jorn Kohlhammer, and Guy Melanlacon .Visual Analytics: Definition, Process, and Challenges. : Information Visualization, LNCS 4950, pp. 154–175, 2008. Springer-Verlag Berlin Heidelberg 2008

Downloads

Published

2014-09-30

How to Cite

Ionita, M. G., & Patriciu, V. V. (2014). Autoimmune Cyber Retaliation Supported by Visual Analytics. Journal of Mobile, Embedded and Distributed Systems, 6(3), 112-121. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/Autoimmune_Cyber_Retaliation_Supported_by_Visual_Analytics