A cyber-security storm MAP

Denise Ferebee, Dipankar Dasgupta, Qishi Wu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

When a cyber-security event occurs, a person has to answer the following questions: what events are happening, where are the events occurring, and how much damage has occurred or will occur. This paper recommends a cyber-security monitoring system that provides correlation of time-series event data, a visual representation of the security events, and gives a predictive forecast of potential events based on known environmental states. The rationale for this comes from the need to have an overall view of security events or storms that are occurring on a network while providing information in reference to severity and a propagation pattern. Thus, it can potentially provide an early warning so that events or storms can be proactively mitigated. In addition, it can help in making business decisions by determining or understanding the relationship between the computing devices and the business/information technology services they make up.

Original languageEnglish (US)
Title of host publicationProceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012
PublisherIEEE Computer Society
Pages93-102
Number of pages10
ISBN (Print)9780769550145
DOIs
StatePublished - Jan 1 2012
Event2012 ASE International Conference on Cyber Security, CyberSecurity 2012 - Washington, D.C., United States
Duration: Dec 14 2012Dec 16 2012

Publication series

NameProceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012

Other

Other2012 ASE International Conference on Cyber Security, CyberSecurity 2012
CountryUnited States
CityWashington, D.C.
Period12/14/1212/16/12

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Keywords

  • Cyber-security
  • event correlation
  • information visualization
  • levels of abstraction
  • security event

Fingerprint Dive into the research topics of 'A cyber-security storm MAP'. Together they form a unique fingerprint.

Cite this