Early Warning Systems for Cyber Defence

H. Kalutarage, Siraj Shaikh, B.-S. Lee, C. Lee, Y. C. Kiat

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)

    Abstract

    Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually update their typical security measures. Attackers often have a long-term interest in their targets. Due to a number of factors such as scale, architecture and nonproductive traffic however it makes difficult to detect them using typical intrusion detection techniques. Cyber early warning systems (CEWS) aim at alerting such attempts in their nascent stages using preliminary indicators. Design and implementation of such systems involves numerous research challenges such as generic set of indicators, intelligence gathering, uncertainty reasoning and information fusion. This paper discusses such challenges and presents the reader with compelling motivation. A carefully deployed empirical analysis using a real world attack scenario and a real network traffic capture is also presented.
    Original languageEnglish
    Title of host publicationOpen Problems in Network Security
    EditorsJan Camenisch, Doğan Kesdoğan
    Place of PublicationSwitzerland
    PublisherSpringer Verlag
    Pages29-42
    Volume9591
    ISBN (Print)978-3-319-39027-7, 978-3-319-39028-4
    DOIs
    Publication statusPublished - 2016
    EventIFIP WG 11.4 International Workshop - Zurich, Switzerland
    Duration: 29 Oct 201529 Oct 2015

    Workshop

    WorkshopIFIP WG 11.4 International Workshop
    Abbreviated titleiNetSec 2015
    Country/TerritorySwitzerland
    CityZurich
    Period29/10/1529/10/15

    Bibliographical note

    The full text is not available on the repository.

    Keywords

    • Bayesian inference
    • Cyber defence
    • Cyber warfare
    • Future
    • internet
    • Early warning systems

    Fingerprint

    Dive into the research topics of 'Early Warning Systems for Cyber Defence'. Together they form a unique fingerprint.

    Cite this