EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE
نویسندگان
چکیده
منابع مشابه
Cyber SA: Situational Awareness for Cyber Defense
1. Be aware of the current situation. This aspect can also be called situation perception. Situation perception includes both situation recognition and identification. Situation identification can include identifying the type of attack (recognition is only recognizing that an attack is occurring), the source (who, what) of an attack, the target of an attack, etc. Situation perception is beyond ...
متن کاملIntelligent Cyber Defense System
In this paper a novel method for detection of network attacks and malicious code is described. The method is based on main principles of Artificial Immune Systems where immune detectors have an Artificial Neural Network’s structure. The main goal of proposed approach is to detect unknown, previous unseen cyber attacks (malicious code, intrusion detection, etc.). The mechanism of evolution of th...
متن کاملOptimizing Active Cyber Defense
Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading “white” or “benign” worms to combat against the attackers’ malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of optimal a...
متن کاملAgile Monitoring for Cyber Defense
The Monitoring, Analysis, and Interpretation Tool Arsenal (MAITA) seeks to support rapid construction and empirical reconfiguration of cyber defense monitoring systems inside the opponent decision cycle through a set of mechanisms including a flexible infrastructure for distributed monitoring processes and signal flows, a monitoring executive that coordinates resource allocation and systemic se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technologies and Learning Tools
سال: 2016
ISSN: 2076-8184
DOI: 10.33407/itlt.v52i2.1398