Abstract
Intrusion sets are “sets of related incidents” (D’Amico and Whitley 2008) that have been collated over time, e.g., a series of incidents from a single actor or targeting a particular resource. Similar incidents can be grouped into intrusion or problem sets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D’Amico A, Whitley K (2008) The real work of computer network defense analysts: the analysis roles and processes that transform network data into security situation awareness. In: Proceedings of the workshop on visualization for computer security, Berlin, Heidelberg, pp 19–37
Lilly B, Moore AS, Hodson QE, Weishoff D (2021) RAND’s scalable warning and resilience model (SWARM): enhancing defenders’ predictive power in cyberspace. RAND Corp
Xu H, Zhou Y, Ming J, Lyu M (2020) Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. Cybersecurity 3(1):1–18
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alsmadi, I. (2023). Computer Network Defense. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-031-21651-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-21651-0_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21650-3
Online ISBN: 978-3-031-21651-0
eBook Packages: EngineeringEngineering (R0)