Reference Hub3
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion

Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion

Ignatius Swart, Barry Irwin, Marthie M. Grobler
Copyright: © 2016 |Volume: 6 |Issue: 3 |Pages: 14
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466692206|DOI: 10.4018/IJCWT.2016070102
Cite Article Cite Article

MLA

Swart, Ignatius, et al. "Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion." IJCWT vol.6, no.3 2016: pp.17-30. http://doi.org/10.4018/IJCWT.2016070102

APA

Swart, I., Irwin, B., & Grobler, M. M. (2016). Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion. International Journal of Cyber Warfare and Terrorism (IJCWT), 6(3), 17-30. http://doi.org/10.4018/IJCWT.2016070102

Chicago

Swart, Ignatius, Barry Irwin, and Marthie M. Grobler. "Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion," International Journal of Cyber Warfare and Terrorism (IJCWT) 6, no.3: 17-30. http://doi.org/10.4018/IJCWT.2016070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The potential attack surface of a nation is large and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a nation. There are a variety of specialised data sources available to assess the state of a nation in key areas such as botnets, spam servers and incorrectly configured hosts. By applying data fusion principles, the potential exists to provide a representative view of all combined data sources. This research will examine a variety of currently available Internet data sources and apply it to an adapted Joint Directors of Laboratories (JDL) data fusion model in order to illustrate the potential gains and current limitations. The JDL model has been adapted to suit national level cyber sensor data fusion with the aim to formally define and reduce data ambiguity and enhance fusion capability in a real world system. A case study highlights the results of applying available open source security information against the model to relate to the current South African cyber landscape.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.