Skip to main content

Modularizing Cyber Defense Situational Awareness – Technical Integration before Human Understanding

  • Conference paper
Future Security (Future Security 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 318))

Included in the following conference series:

Abstract

Human cyber situational awareness can only be achieved through appropriate visualization. Observation, understanding and projecting the status of cyber resources need to be supported by novel display and interaction techniques. These displays can only be realized if the cyber security-related data is sufficiently structured. We propose a two-stage creation of human cyber situational awareness: the first stage consists of technically integrating all security-related knowledge about the defended systems into a comprehensive model. In the second stage, this semantically enriched data can be visualized in a way that intuitively supports the operators’ understanding of the current security situation as well as analysis techniques that go beyond the current state of the art.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Endsley, M.: Theoretical Underpinnings of Situational awareness: A Critical Review. In: Endsley, M.R., Garland, D.J. (eds.) Situational Awareness Analysis and Measurement, Mahwah, NJ, USA (2000)

    Google Scholar 

  2. Klein, G., Hunke, S., Günther, H., Jahnke, M.: Model-based Cyber Defense Situational Awareness. To be Published in Praxis der Informationsverarbeitung und Kommunikation (PIK). K. G. Saur Verlag, München (2012)

    Google Scholar 

  3. Webster, S., Lippmann, R., Zissman, M.: Experience Using Active and Passive Mapping for Network Situational Awareness. In: Fifth IEEE International Symposium on Network Computing and Applications (2006)

    Google Scholar 

  4. Bartlett, G., Heidemann, J., Papadopoulos, C.: Understanding Passive and Active Service Discovery. In: Internet Measurement Conference, San Diego, California, USA (2007)

    Google Scholar 

  5. MITRE Corporation. Common Platform Enumeration, http://cpe.mitre.org/ (accessed March 2012)

  6. MITRE Corporation. Common Configuration Enumeration, http://cce.mitre.org/ (accessed March 2012)

  7. Vicente, K., Rasmussen, J.: Ecological interface design: Theoretical foundations. IEEE Transactions on Systems, Man, and Cybernetics 22, 589–606 (1992)

    Article  Google Scholar 

  8. Vicente, K.J.: Cognitive Work Analysis: Towards Safe, Productive, and Healthy Computer-based Work. Lawrence Erlbaum Associates, Mahwah (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Klein, G., Günther, H., Träber, S. (2012). Modularizing Cyber Defense Situational Awareness – Technical Integration before Human Understanding. In: Aschenbruck, N., Martini, P., Meier, M., Tölle, J. (eds) Future Security. Future Security 2012. Communications in Computer and Information Science, vol 318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33161-9_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33161-9_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33160-2

  • Online ISBN: 978-3-642-33161-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics