LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Evangelopoulou, Maria; Johnson, Christopher (2015)
Languages: English
Types: Other
Subjects: T1
his paper presents an empirical framework for implementing Situation Awareness Measurement Techniques in a Network Defense environment. Bearing in mind the rise of Cyber-crime and the importance of Cyber security, the role of the security analyst (or as this paper will refer to them, defenders) is critical. In this paper the role of Situation Awareness Measurement Techniques will be presented and explained briefly. Input from previous studies will be given and an empirical framework of how to measure Situation Awareness in a computing network environment will be offered in two main parts. The first one will include the networking infrastructure of the system. The second part will be focused on specifying which Situation Awareness Techniques are going to be used and which Situation Awareness critical questions need to be asked to improve future decision making in cyber-security. Finally, a discussion will take place concerning the proposed approach, the chosen methodology and further validation.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] A. Kaur, V. Dutt, and C. Gonzalez, “Modelling the security analyst's role: effects of similarity and past experience on cyber attack detection,” in Data and Applications Security and Privacy XXV, 2011, [Springer, pp.280-292].
    • [2] C.L. Paul, and K. Whitley, “A taxonomy of cyber awareness questions for the user-centered design of cyber situational awareness,” in Human Aspects of Information Security, Privacy and Trust, 2013, [Springer, pp.145-154].
    • [3] F. T. Durso, and S. D. Gronlund, “Situation awareness,” Handbook of Applied Cognition, 1999, [pp.283-314] .
    • [4] G. Fink, D. Best, D. Manz, V. Popovsky, and B. Endicott-Popovsky, “Gamification for measuring cyber security situational awareness,” in Foundations of Augmented Cognition, 2013, [Springer, pp.656-665].
    • [5] L. Bainbridge, "Ironies of automation," in Automatica, 1983, [19(6), pp.775-779].
    • [6] Logstalgia. "Website access log visualisation," in Google Project Hosting, [20/02/1015, https://code.google.com/p/logstalgia].
    • M. Evangelopoulou, and C.W. Johnson, “Attack visualization for cybersecurity situation awareness,” 2014, awaits publication information.
    • M. Evangelopoulou, and C.W. Johnson, “Implementation of safety techniques in a cyber domain,” in Proceedings of the 7th International Conference on Security of Information and Networks, September 2014, [ACM, p.261].
    • M. R. Endsley, “Measurement of situation awareness in dynamic systems,” in Human Factors: The Journal of Human Factors and Ergonomics Society, 1995 [37(1), pp. 65-84].
    • [10] M. R. Endsley, “Situation awareness global assessment technique (sagat),” in Aerospace and Electronics Conference, NAECON 1988, May 1988 [Proceedings of the IEEE 1988 National, pp. 789-795].
    • [11] M. R. Endsley, “The role of situation awareness in naturalistic decision making,” in Naturalistic Decision Making: Experise: Research and Applications, 1997, [pp. 269-283].
    • [12] M. R. Endsley, “Toward a theory of situation awareness in dynamic systems,” in Human Factors: The Journal of Human Factors and Ergonomics Society, 1995 [37(1), pp. 32-64].
    • [13] S. Stevens-Adams, A. Carbajal, A. Silva, K. Nauer, B. Anderson, T. Reed, and C. Forsythe, “Enhanced training for cyber situational awareness,” in Foundations of Augmented Cognition, 2013 [Springer, pp.90-99].
    • [14] S. Wood, J. Mathewson, J. Joy, M.O. Stehr, M. Kim, A. Gehani, M. Gerla, H. Sadjadpour, and J. Garcia-Luna-Aceves, “ICEMAN: a practical architecture for situational awareness at the network edge,” 2013.
    • [15] T. Z. Strybel, R. S. Pierce, and K. P. L. Vu, "Comparing situation awareness measurement techniques in a low fidelity air traffic control simulation”, in Proceedings of the 26th International Congress of the Aeronautical Sciences (ICAS), September 2008, [pp. 3525-3532].
    • [16] V. Dutt, Y.S. Ahn, and C. Gonzalez, “Cyber situational awareness: modeling detection of cyber attacks with instance-based learning theory,” in Human Factors, 2013, [The Journal of the Human Factors and Ergonomics Society, 55(3), pp. 605-618].
    • [17] W. Yu, S. Wei, D.Shen, M. Blowers, E. P. Blash, K. D. Pham, G. Chen, H. Zhang, and C. Lu, “On detection and visualization techniques for cyber security situation awareness,” in SPIE Defense, Security and Sensing, May 2013 [International Society for Optics and Photonics, pp.87390R-87390R].
    • [18] Whitehouse, Office of the Press Secretary, 2011, "Remarks by the President on securing our nation's cyber infrastructure," [http://www.whitehouse.gov/the_press_office/Remarks-by-thepresident-on-Securing-Our-Nations-Cyber-Inrastructure/] .
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

  • BioEntity Site Name
    Google Code

Share - Bookmark

Download from

Cite this article