Skip to main content

Designing a Cyber Attack Information System for National Situational Awareness

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 318))

Abstract

Information and communication technology (ICT) systems underpin many of today’s societal functions and economic development. Consequently, protecting a nation’s ICT infrastructure from deliberate cyber attacks and unintentional disruptions is of paramount importance. Collaboration among all parties across all domains of cyberspace is the key to effective and coordinated effort to cope with cyber threats. This is particularly the case as cyber threats become increasingly sophisticated and distributed. In this paper, we introduce the foundational building blocks to realize an efficient incident response cycle on a national level, and propose the design of a conceptual framework – the Cyber Attack Information System (CAIS) – for establishing national cyber situational awareness.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arbor networks, http://www.arbornetworks.com/

  2. Internet storm center, http://isc.sans.org/

  3. Phishtank, http://www.phishtank.com/

  4. Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In: USENIX Security Symposium, Washington, DC, USA (August 2010)

    Google Scholar 

  5. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3) (2009)

    Google Scholar 

  6. Endsley, M.: Toward a theory of situation awareness in dynamic systems. Human Factors 37(1), 32–64 (1995)

    Article  Google Scholar 

  7. ENISA: Practical guide/roadmap for a suitable channel for secure communication: secure communicatio with the CERTs & other statkeholders (December 2011)

    Google Scholar 

  8. EU Press Release IP/07/453: ICT drives 50% of eu growth, says commission’s annual report on the digital economy (2007)

    Google Scholar 

  9. Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier. Tech. rep., Symantic Security Response (October 2010)

    Google Scholar 

  10. Fracker, M.: Measures of situation awareness: Review and future directions. Tech. Rep. AL-TR-1991-0128, Wright-Patterson Air Force Base, OH: Armstrong Laboratories (1991)

    Google Scholar 

  11. Jajodia, S., Liu, P., Swarup, V., Wang, C.: Cyber Situational Awareness: Issues and Research, 1st edn. Springer Publishing Company, Incorporated (2009)

    Google Scholar 

  12. Lewis, J.A.: Selected bibliography for cyber security, http://csis.org/publication/selected-bibliography-cyber-security

  13. Macal, C.M., North, M.J.: Tutorial on agent-based modelling and simulation. Journal of Simulation 4, 151–162 (2010)

    Article  Google Scholar 

  14. Nguyen, T.T.T., Armitage, G.J.: A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials 10(1–4), 56–76 (2008)

    Article  Google Scholar 

  15. Ottis, R.: Analysis of the 2007 cyber attacks against estonia from the information warfare perspective. In: Proceedings of the 7th European Conference on Information Warfare, p. 163. Academic Conferences Limited (April 2008)

    Google Scholar 

  16. Sarter, N., Woods, D.: Situation awareness: A critical but ill-defined phenomenon. International Journal of Aviation Psychology 1, 45–57 (1991)

    Article  Google Scholar 

  17. Smith, P., Hutchison, D., Sterbenz, J.P.G., Schöller, M., Fessi, A., Doerr, C., Lac, C.: D1.5c: Final strategy document for resilient networking. ResumeNet Project Deliverable (August 2011), http://www.resumenet.eu

  18. Tadda, G., Salerno, J.J., Boulware, D., Hinman, M., Gorton, S.: Realizing situation awareness within a cyber environment. In: Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications, Orlando, FL, USA (April 2006)

    Google Scholar 

  19. Tikk, E., Kaska, K., Rünnimeri, K., Kert, M., Talihärm, A.M., Vihul, L.: Cyber attacks against georgia: Legal lessons identified (Novermber 2008), http://www.carlisle.army.mil/dime/getDoc.cfm?fileID=167

  20. U.S. Homeland Security Cyber Security R&D Center: A roadmap for cybersecurity research (November 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Skopik, F., Ma, Z., Smith, P., Bleier, T. (2012). Designing a Cyber Attack Information System for National Situational Awareness. In: Aschenbruck, N., Martini, P., Meier, M., Tölle, J. (eds) Future Security. Future Security 2012. Communications in Computer and Information Science, vol 318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33161-9_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33161-9_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33160-2

  • Online ISBN: 978-3-642-33161-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics