Active perception for cyber intrusion detection and defense

Robert P. Goldman, Mark Burstein, J. Benton, Ugur Kuter, Joseph Mueller, Paul Robertson, Dan Cerys, Andreas Hoffman, Rusty Bobrow

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest to inform decisions about cyber defense actions. By identifying critical network assets, the organization's mission measures interest (and value of information). This model enables the system to follow leads from inexpensive, inaccurate alerts with targeted use of expensive, accurate sensors. This allows the deployment of sensors to build structured interpretations of situations. From these, an organization can meet mission-centered decision-making requirements with calibrated responses proportional to the likelihood of true detection and degree of threat.

Original languageEnglish (US)
Title of host publicationProceedings - 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages92-101
Number of pages10
ISBN (Electronic)9781467384391
DOIs
StatePublished - Oct 23 2015
Externally publishedYes
EventIEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2015 - Cambridge, United States
Duration: Sep 21 2015Sep 25 2015

Publication series

NameProceedings - 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2015

Conference

ConferenceIEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2015
Country/TerritoryUnited States
CityCambridge
Period9/21/159/25/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • IDS correlation
  • active perception
  • cyber defense
  • intrusion detection

Fingerprint

Dive into the research topics of 'Active perception for cyber intrusion detection and defense'. Together they form a unique fingerprint.

Cite this