@inproceedings{8144401267f94ac1b62ce02e920a32c1,
title = "A cyber-security storm MAP",
abstract = "When a cyber-security event occurs, a person has to answer the following questions: what events are happening, where are the events occurring, and how much damage has occurred or will occur. This paper recommends a cyber-security monitoring system that provides correlation of time-series event data, a visual representation of the security events, and gives a predictive forecast of potential events based on known environmental states. The rationale for this comes from the need to have an overall view of security events or storms that are occurring on a network while providing information in reference to severity and a propagation pattern. Thus, it can potentially provide an early warning so that events or storms can be proactively mitigated. In addition, it can help in making business decisions by determining or understanding the relationship between the computing devices and the business/information technology services they make up.",
keywords = "Cyber-security, event correlation, information visualization, levels of abstraction, security event",
author = "Denise Ferebee and Dipankar Dasgupta and Qishi Wu",
year = "2012",
month = jan,
day = "1",
doi = "10.1109/CyberSecurity.2012.19",
language = "English (US)",
isbn = "9780769550145",
series = "Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012",
publisher = "IEEE Computer Society",
pages = "93--102",
booktitle = "Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012",
address = "United States",
note = "2012 ASE International Conference on Cyber Security, CyberSecurity 2012 ; Conference date: 14-12-2012 Through 16-12-2012",
}