Subscribe free to our newsletters via your
. Space Industry and Business News .




CYBER WARS
Preventing 'Cyber Pearl Harbor'
by Staff Writers
Washington DC (SPX) Dec 04, 2012


The authors suggest that employers evaluate an analysts' risk tolerance before employment and/or manipulate tolerance levels during training to better identify threats.

Cyber attacks that have long caused major work disruption and theft of private information are becoming more sophisticated with prolonged attacks perpetrated by organized groups.

In September 2012, Bank of America, Citibank, the New York Stock Exchange, and other financial institutions were targets of attacks for more than five weeks.

Defense Secretary Leon E. Panetta warned that the United States was facing the possibility of a "cyber-Pearl Harbor" and was increasingly vulnerable to foreign computer hackers who could disrupt the government, utility, transportation, and financial networks.

Key to protecting online operations is a high degree of "cyber security awareness," according to human factors/ergonomics researchers Varun Dutt, Young-Suk Ahn, and Cleotilde Gonzalez.

In their Human Factors article, "Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory," they developed a computer model that presented 500 simulated cyber attack scenarios to gauge simulated network security analysts' ability to detect attacks characterized as either "impatient" (the threat occurs early in the attack) or "patient" (the threat comes later in the attack and is not detected promptly).

Their model was able to predict the detection rates of security analysts by varying the analysts' degree of experience and risk tolerance as well as an attacker's strategy (impatient or patient attack).

The authors found that experienced, risk-averse analysts were less accurate at detecting threats in patient than in impatient attacks.

"In a patient attack, when the attacker waits until the end to generate threats, the experiences in the analyst's memory that indicate an attack" are not as readily retrieved, says Dutt, which "makes it difficult to correctly detect patient attacks."

"Application of our results include the design of training tools that increase competency and the development of decision-support tools that improve defenders' on-the-job performance in detecting cyber attacks."

The authors suggest that employers evaluate an analysts' risk tolerance before employment and/or manipulate tolerance levels during training to better identify threats.

As cyber warfare strategies and tactics evolve, the authors plan to further investigate the trend of drawn-out attacks and new intrusion detection software.

Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory

.


Related Links
Human Factors and Ergonomics Society
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Manning tells court he 'fell apart' during detention
Fort Meade (AFP) Maryland (AFP) Nov 29, 2012
The US Army private accused of passing secret documents to WikiLeaks said Thursday he "started to fall apart" after being detained, as he took the stand for the first time in the case. Bradley Manning, 24, looked nervous and his voice trembled slightly as he began to answer questions at a pre-trial hearing in a courtroom at Fort Meade, Maryland, north of the US capital. Manning faces an ... read more


CYBER WARS
Android extends global smartphone lead: survey

Experiment yields possible 'spooky' matter

ORNL develops lignin-based thermoplastic conversion process

Sender of first text message 'amazed' 20 years on

CYBER WARS
US Air Force selects Raytheon to develop future Protected SATCOM System

General Dynamics Awarded Contract Under New U.S. Army Rapid-Acquisition Communications Program

Astrium to provide military X-band satcoms to six UK Royal Navy vessels

Lockheed Martin to Demonstrate Key Component of Tactical MilSat Communications System

CYBER WARS
S. Korea readies new bid to join global space club

Arianespace Lofts Pleiades 1B Using Soyuz Medium-lift launcher

Japan Schedules Radar Satellite Launch

Arianespace ready for next Soyuz and Ariane missions

CYBER WARS
Retired GIOVE-A satellite helps SSTL demonstrate first High Altitude GPS navigation fix

GTX Gets Approval For Custom Two-Way GPS Tracking Devices On Planes

East Riding Of Yorkshire Council Selects Ctrack For Specialist Vehicle Tracking Solution

Researchers Use GPS Tracking to Monitor Crab Behavior

CYBER WARS
Four injured in China fighter jet crash: reports

Sandy adds to global air traffic gloom: IATA

India to buy nearly 130 Su-30 fighter jets from Russia

French police fire tear gas anew on airport protest

CYBER WARS
Research discovery could revolutionise semiconductor manufacture

Engineers pave the way towards 3D printing of personal electronics

Antenna-on-a-chip rips the light fantastic

Fabrication on patterned silicon carbide produces bandgap to advance graphene electronics

CYBER WARS
NASA's Tropical Rainfall Measuring Mission Turns 15

Tracking Pollution from Outer Space

NASA's TRMM Satellite Confirms 2010 Landslides

GOES-R Satellite Program Undergoes Successful Review

CYBER WARS
Kerosene lamps spew black carbon, should be replaced

Answer to Mongolia pollution is blowing in the wind

Poland set to become last EU state to ratify landmine pact

Pollution shuts schools, agencies in Tehran




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement