Cyber Situational Awareness for CPS, 5G and IoT

  • Elizabeth ChangEmail author
  • Florian Gottwalt
  • Yu Zhang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 433)


The 2020 wireless strategy is centred on creative 5G and IoT with the front runners from US, EU, China, Japan and Korea. There are trillions of dollars invested towards 2020. The wireless future is designated to be mobile. While the confidence of the future mobile technology will help innovate our government, workforce, industry and social media, the key threat to future mobile wireless development is the growing concern of its security and privacy through anomaly detection. This keynote presents key features of 2020 wireless strategy and new approaches on cyber situation awareness—the enablement to achieve 2020 wireless leadership.


2020 wireless strategy 5G IoT Cyber situation awareness Natural law Anomaly detection ontology 


  1. 1.
    U. Franke, J. Brynielsson, Cyber situational awareness—a systematic review of the literature. Comput. Secur. 46, 18–31 (2014)CrossRefGoogle Scholar
  2. 2.
    P. Barford et al., Cyber SA: situational awareness for cyber defense, in Cyber Situational Awareness (Springer, 2010), pp. 3–13Google Scholar
  3. 3.
    M. Eric, T. Michael, An alternative framework for research on situational awareness in computer network defense, in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, ed. by O. Cyril and O. Thomas (IGI Global, Hershey, PA, USA, 2012), pp. 71–85Google Scholar
  4. 4.
    J. Yen et al., RPD-based hypothesis reasoning for cyber situation awareness, in Cyber Situational Awareness (Springer, 2010), pp. 39–49Google Scholar
  5. 5.
    M. Sudit, A. Stotz, M. Holender, Situational awareness of a coordinated cyber attack, in Defense and Security (International Society for Optics and Photonics, 2005)Google Scholar
  6. 6.
    A.C. Squicciarini et al., Situational awareness through reasoning on network incidents, in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (ACM, San Antonio, Texas, USA, 2014), pp. 111–122Google Scholar
  7. 7.
    C.A. Catania, C.G. Garino, Automatic network intrusion detection: current techniques and open issues. Comput. Electr. Eng. 38(5), 1062–1072 (2012)CrossRefGoogle Scholar
  8. 8.
    V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)CrossRefGoogle Scholar
  9. 9.
    R. Sommer, V. Paxson, Outside the closed world: on using machine learning for network intrusion detection, in 2010 IEEE Symposium on Security and Privacy (2010), pp. 305–316Google Scholar
  10. 10.
    A. Milenkoski et al., Evaluating computer intrusion detection systems: a survey of common practices. ACM Comput. Surv. 48(1), 1–41 (2015)CrossRefGoogle Scholar
  11. 11.
    F. Gottwalt, A.P. Karduck, SIM in light of big data, in 2015 11th International Conference on Innovations in Information Technology (IIT) (IEEE, 2015)Google Scholar
  12. 12.
    R. Zuech, T.M. Khoshgoftaar, R. Wald, Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 1–41 (2015)CrossRefGoogle Scholar
  13. 13.
    F. Gottwalt, A. Waller, W. Liu, Natural laws as a baseline for network anomaly detection, in 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16) (IEEE CPS, Tianjin, 2016)Google Scholar
  14. 14.
    K. Veeramachaneni, I. Arnaldo, A. Cuesta-Infante, V. Korrapati, C. Bassias, K. Li, AI2: training a big data machine to defend, in The 2nd IEEE International Conference on Big Data Security (2016)Google Scholar
  15. 15.
    S. Avidan, Spatialboost: adding spatial reasoning to adaboost, in European Conference on Computer Vision (Springer, 2006)Google Scholar
  16. 16.
    F.E. White, Data fusion Lexicon, DTIC Document, 1991Google Scholar
  17. 17.
    P. Giura, W. Wang. A context-based detection framework for advanced persistent threats, in 2012 International Conference on Cyber Security (CyberSecurity) (2012)Google Scholar
  18. 18.
    J.D. Vries et al., Systems for detecting advanced persistent threats: a development roadmap using intelligent data analysis, in 2012 International Conference on Cyber Security (CyberSecurity) (2012)Google Scholar
  19. 19.
    F. Gottwalt, A. Karduck, SIM in light of big data, in IEEE TrustCon 2015, ChinaGoogle Scholar
  20. 20.
    F. Gottwalt, A Scalable Context-Awareness Anomaly Ressoning—A SCALAR Approach (UNSW, 2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.University of New South Wales and Australian Defence Force AcademyCanberraAustralia

Personalised recommendations