Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Preventing 'Cyber Pearl Harbor'
by Staff Writers
Washington DC (SPX) Dec 04, 2012


The authors suggest that employers evaluate an analysts' risk tolerance before employment and/or manipulate tolerance levels during training to better identify threats.

Cyber attacks that have long caused major work disruption and theft of private information are becoming more sophisticated with prolonged attacks perpetrated by organized groups.

In September 2012, Bank of America, Citibank, the New York Stock Exchange, and other financial institutions were targets of attacks for more than five weeks.

Defense Secretary Leon E. Panetta warned that the United States was facing the possibility of a "cyber-Pearl Harbor" and was increasingly vulnerable to foreign computer hackers who could disrupt the government, utility, transportation, and financial networks.

Key to protecting online operations is a high degree of "cyber security awareness," according to human factors/ergonomics researchers Varun Dutt, Young-Suk Ahn, and Cleotilde Gonzalez.

In their Human Factors article, "Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory," they developed a computer model that presented 500 simulated cyber attack scenarios to gauge simulated network security analysts' ability to detect attacks characterized as either "impatient" (the threat occurs early in the attack) or "patient" (the threat comes later in the attack and is not detected promptly).

Their model was able to predict the detection rates of security analysts by varying the analysts' degree of experience and risk tolerance as well as an attacker's strategy (impatient or patient attack).

The authors found that experienced, risk-averse analysts were less accurate at detecting threats in patient than in impatient attacks.

"In a patient attack, when the attacker waits until the end to generate threats, the experiences in the analyst's memory that indicate an attack" are not as readily retrieved, says Dutt, which "makes it difficult to correctly detect patient attacks."

"Application of our results include the design of training tools that increase competency and the development of decision-support tools that improve defenders' on-the-job performance in detecting cyber attacks."

The authors suggest that employers evaluate an analysts' risk tolerance before employment and/or manipulate tolerance levels during training to better identify threats.

As cyber warfare strategies and tactics evolve, the authors plan to further investigate the trend of drawn-out attacks and new intrusion detection software.

Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory

.


Related Links
Human Factors and Ergonomics Society
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Manning tells court he 'fell apart' during detention
Fort Meade (AFP) Maryland (AFP) Nov 29, 2012
The US Army private accused of passing secret documents to WikiLeaks said Thursday he "started to fall apart" after being detained, as he took the stand for the first time in the case. Bradley Manning, 24, looked nervous and his voice trembled slightly as he began to answer questions at a pre-trial hearing in a courtroom at Fort Meade, Maryland, north of the US capital. Manning faces an ... read more


CYBER WARS
NATO expected to clear Turkey missile deployment

New system intercepts, destroys target

Deploying Patriots in Turkey to take some weeks: US

Japan readies missile defence over N. Korean rocket

CYBER WARS
Patriots: The 'hit-to-kill' star missiles of the US armoury

MEADS Intercepts Air-Breathing Target at White Sands Missile Range

Pakistan test fires nuclear-capable ballistic missile

Missile test fears shadow S. Korea-China talks

CYBER WARS
X-37B Space Plane: Still in Search of a Mission

Iran claims US drone captured

First Catapult Launch of X-47B Unmanned Aircraft Launched

Prototype of European combat drone makes maiden flight

CYBER WARS
US Air Force selects Raytheon to develop future Protected SATCOM System

General Dynamics Awarded Contract Under New U.S. Army Rapid-Acquisition Communications Program

Astrium to provide military X-band satcoms to six UK Royal Navy vessels

Lockheed Martin to Demonstrate Key Component of Tactical MilSat Communications System

CYBER WARS
Australia reviews military base security

Raytheon wins first contract for new lightweight GPS anti-jam capability for land systems

Dressing U.S. Troops to Safeguard Against Insect Attacks

BAE, EXPAL team up for munitions deal

CYBER WARS
Germany eyes big-ticket Mideast arms sales

EADS announces up to 850 job cuts in defence arm

Chile mulls options on attack copters

China mourns manager of J-15 jet program

CYBER WARS
Angela Merkel, Europe's guiding light and lightning rod

India stands firm on South China Sea

China's Xi vows to rule by law

Indian navy chief says Chinese build-up a 'major concern'

CYBER WARS
A graphene nanotube hybrid

Penn Researchers Make Flexible, Low-voltage Circuits Using Nanocrystals

King's College London finds rainbows on nanoscale

Optical microscopes lend a hand to graphene research




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement