Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Preventing 'Cyber Pearl Harbor'
by Staff Writers
Washington DC (SPX) Dec 04, 2012


The authors suggest that employers evaluate an analysts' risk tolerance before employment and/or manipulate tolerance levels during training to better identify threats.

Cyber attacks that have long caused major work disruption and theft of private information are becoming more sophisticated with prolonged attacks perpetrated by organized groups.

In September 2012, Bank of America, Citibank, the New York Stock Exchange, and other financial institutions were targets of attacks for more than five weeks.

Defense Secretary Leon E. Panetta warned that the United States was facing the possibility of a "cyber-Pearl Harbor" and was increasingly vulnerable to foreign computer hackers who could disrupt the government, utility, transportation, and financial networks.

Key to protecting online operations is a high degree of "cyber security awareness," according to human factors/ergonomics researchers Varun Dutt, Young-Suk Ahn, and Cleotilde Gonzalez.

In their Human Factors article, "Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory," they developed a computer model that presented 500 simulated cyber attack scenarios to gauge simulated network security analysts' ability to detect attacks characterized as either "impatient" (the threat occurs early in the attack) or "patient" (the threat comes later in the attack and is not detected promptly).

Their model was able to predict the detection rates of security analysts by varying the analysts' degree of experience and risk tolerance as well as an attacker's strategy (impatient or patient attack).

The authors found that experienced, risk-averse analysts were less accurate at detecting threats in patient than in impatient attacks.

"In a patient attack, when the attacker waits until the end to generate threats, the experiences in the analyst's memory that indicate an attack" are not as readily retrieved, says Dutt, which "makes it difficult to correctly detect patient attacks."

"Application of our results include the design of training tools that increase competency and the development of decision-support tools that improve defenders' on-the-job performance in detecting cyber attacks."

The authors suggest that employers evaluate an analysts' risk tolerance before employment and/or manipulate tolerance levels during training to better identify threats.

As cyber warfare strategies and tactics evolve, the authors plan to further investigate the trend of drawn-out attacks and new intrusion detection software.

Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory

.


Related Links
Human Factors and Ergonomics Society
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Manning tells court he 'fell apart' during detention
Fort Meade (AFP) Maryland (AFP) Nov 29, 2012
The US Army private accused of passing secret documents to WikiLeaks said Thursday he "started to fall apart" after being detained, as he took the stand for the first time in the case. Bradley Manning, 24, looked nervous and his voice trembled slightly as he began to answer questions at a pre-trial hearing in a courtroom at Fort Meade, Maryland, north of the US capital. Manning faces an ... read more


CYBER WARS
WSU researchers use 3-D printer to make parts from moon rock

China's Chang'e-3 to land on moon next year

Moon crater yields impact clues

Study: Moon basin formed by giant impact

CYBER WARS
NASA Mars Rover Fully Analyzes First Soil Samples

Curiosity Shakes, Bakes, and Tastes Mars with SAM

China prepares to grow vegetables on Mars: state media

Opportunity Gets to Work on Interesting Rock Targets

CYBER WARS
SciTechTalk: Media fixes for space junkies

NASA Voyager 1 Encounters New Region in Deep Space

Voyager discovers 'magnetic highway' at edge of solar system

Why Study Plants in Space?

CYBER WARS
Mr Xi in Space

China plans manned space launch in 2013: state media

China to launch manned spacecraft

Tiangong 1 Parked And Waiting As Shenzhou 10 Mission Prep Continues

CYBER WARS
Space Station to reposition for science

Spacewalks on agenda for new space crew

NASA, Roscosmos Assign Veteran Crew to Yearlong Space Station Mission

Three ISS crew return to Earth in Russian capsule

CYBER WARS
S. Korea readies new bid to join global space club

Arianespace Lofts Pleiades 1B Using Soyuz Medium-lift launcher

Japan Schedules Radar Satellite Launch

Arianespace ready for next Soyuz and Ariane missions

CYBER WARS
Do missing Jupiters mean massive comet belts?

Brown Dwarfs May Grow Rocky Planets

Astronomers report startling find on planet formation

A Sky Full of Planets

CYBER WARS
Android extends global smartphone lead: survey

Experiment yields possible 'spooky' matter

ORNL develops lignin-based thermoplastic conversion process

Sender of first text message 'amazed' 20 years on




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement