An Alternative Framework for Research on Situational Awareness in Computer Network Defense

2014 ◽  
pp. 322-336
Author(s):  
Eric McMillan ◽  
Michael Tyworth

In this chapter the authors present a new framework for the study of situation awareness in computer network defense (cyber-SA). While immensely valuable, the research to date on cyber-SA has overemphasized an algorithmic level of analysis to the exclusion of the human actor. Since situation awareness, and therefore cyber-SA, is a human cognitive process and state, it is essential that future cyber-SA research account for the human-in-the-loop. To that end, the framework in this chapter presents a basis for examining cyber-SA at the cognitive, system, work, and enterprise levels of analysis. In describing the framework, the authors present examples of research that are emblematic of each type of analysis.

Author(s):  
Eric McMillan ◽  
Michael Tyworth

In this chapter the authors present a new framework for the study of situation awareness in computer network defense (cyber-SA). While immensely valuable, the research to date on cyber-SA has overemphasized an algorithmic level of analysis to the exclusion of the human actor. Since situation awareness, and therefore cyber-SA, is a human cognitive process and state, it is essential that future cyber-SA research account for the human-in-the-loop. To that end, the framework in this chapter presents a basis for examining cyber-SA at the cognitive, system, work, and enterprise levels of analysis. In describing the framework, the authors present examples of research that are emblematic of each type of analysis.


Author(s):  
Cyril Onwubiko ◽  
Thomas Owens

The importance of situational awareness to air traffic control, and hence the safety and security of aircraft, is evident, demonstrable, and has been hugely significant. The main purpose of this book is to convey an understanding of the impact of situational awareness on the design of the next generation computer systems, network architectures, and platform infrastructures. The book achieves its purpose by presenting principles, methods, and applications of situational awareness for computer network defense; in doing so, it makes clear the benefits situational awareness can provide for information security, computer security and computer network defense. This book contributes to cross-multidisciplinary discussion among researchers, academia, and practitioners who are engaged objectively in sharing, contributing, and showcasing how situational awareness can be adapted to computer systems, network infrastructure designs, and architecture patterns. The goal of this chapter is to explain situational awareness for computer network defense from the point of view of its most basic foundations as a spring board to discuss how situational awareness can be relevant to computer network defense, whose operations and environment are similar to air traffic control where the application of situational awareness has been hugely successful.


Author(s):  
Uri Blumenthal ◽  
Joshua Haines ◽  
William Streilein ◽  
Gerald O’Leary

Situational awareness – the perception of “what is going on” – is crucial in every field of human endeavor, especially so in the cyber world where most of the protections afforded by physical time and distance are taken away. Since ancient times, military science emphasized the importance of preserving your awareness of the battlefield and at the same time preventing your adversary from learning the true situation for as long as possible. Today cyber is officially recognized as a contested military domain like air, land, and sea. Therefore situational awareness in computer networks will be under attacks of military strength and will require military-grade protection. This chapter describes the emerging threats for computer SA, and the potential avenues of defense against them.


Author(s):  
Cyril Onwubiko

This chapter describes work on modelling situational awareness information and system requirements for the mission. Developing this model based on Goal-Oriented Task Analysis representation of the mission using an Agent Oriented Software Engineering methodology advances current information requirement models because it provides valuable insight on how to effectively achieve the mission’s requirements (information, systems, networks, and IT infrastructure), and offers enhanced situational awareness within the Computer Network Defence environment. Further, the modelling approach using Secure Tropos is described, and model validation using a security test scenario is discussed.


2014 ◽  
Vol 9 (2) ◽  
Author(s):  
Zhao Wei ◽  
Chunhe Xia ◽  
Yang Luo ◽  
Xiaochen Liu ◽  
Weikang Wu

Author(s):  
Kevin B. Bennett ◽  
Adam Bryant ◽  
Christen Sushereba

Objective: A prototype ecological interface for computer network defense (CND) was developed. Background: Concerns about CND run high. Although there is a vast literature on CND, there is some indication that this research is not being translated into operational contexts. Part of the reason may be that CND has historically been treated as a strictly technical problem, rather than as a socio-technical problem. Methods: The cognitive systems engineering (CSE)/ecological interface design (EID) framework was used in the analysis and design of the prototype interface. A brief overview of CSE/EID is provided. EID principles of design (i.e., direct perception, direct manipulation and visual momentum) are described and illustrated through concrete examples from the ecological interface. Results: Key features of the ecological interface include (a) a wide variety of alternative visual displays, (b) controls that allow easy, dynamic reconfiguration of these displays, (c) visual highlighting of functionally related information across displays, (d) control mechanisms to selectively filter massive data sets, and (e) the capability for easy expansion. Cyber attacks from a well-known data set are illustrated through screen shots. Conclusion: CND support needs to be developed with a triadic focus (i.e., humans interacting with technology to accomplish work) if it is to be effective. Iterative design and formal evaluation is also required. The discipline of human factors has a long tradition of success on both counts; it is time that HF became fully involved in CND. Application: Direct application in supporting cyber analysts.


Sign in / Sign up

Export Citation Format

Share Document