Abstract
This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest to inform decisions about cyber defense actions. By identifying critical network assets, the organization's mission measures interest (and value of information). This model enables the system to follow leads from inexpensive, inaccurate alerts with targeted use of expensive, accurate sensors. This allows the deployment of sensors to build structured interpretations of situations. From these, an organization can meet mission-centered decision-making requirements with calibrated responses proportional to the likelihood of true detection and degree of threat.
Original language | English (US) |
---|---|
Title of host publication | Proceedings - 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2015 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 92-101 |
Number of pages | 10 |
ISBN (Electronic) | 9781467384391 |
DOIs | |
State | Published - Oct 23 2015 |
Externally published | Yes |
Event | IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2015 - Cambridge, United States Duration: Sep 21 2015 → Sep 25 2015 |
Publication series
Name | Proceedings - 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2015 |
---|
Conference
Conference | IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2015 |
---|---|
Country/Territory | United States |
City | Cambridge |
Period | 9/21/15 → 9/25/15 |
Bibliographical note
Publisher Copyright:© 2015 IEEE.
Keywords
- IDS correlation
- active perception
- cyber defense
- intrusion detection