Untitled Document
Not a member yet? Register for full benefits!

 Preventing 'Cyber Pearl Harbor'

This story is from the category Libraries and Components
Printer Friendly Version
Email to a Friend (currently Down)



Date posted: 02/12/2012

Cyber attacks that have long caused major work disruption and theft of private information are becoming more sophisticated with prolonged attacks perpetrated by organized groups. In September 2012, Bank of America, Citibank, the New York Stock Exchange, and other financial institutions were targets of attacks for more than five weeks. Defense Secretary Leon E. Panetta warned that the United States was facing the possibility of a "cyber-Pearl Harbor" and was increasingly vulnerable to foreign computer hackers who could disrupt the government, utility, transportation, and financial networks.

Key to protecting online operations is a high degree of "cyber security awareness," according to human factors/ergonomics researchers Varun Dutt, Young-Suk Ahn, and Cleotilde Gonzalez. In their Human Factors article, "Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory (http://bit.ly/VjVs7M)," they developed a computer model that presented 500 simulated cyber attack scenarios to gauge simulated network security analysts' ability to detect attacks characterized as either "impatient" (the threat occurs early in the attack) or "patient" (the threat comes later in the attack and is not detected promptly). Their model was able to predict the detection rates of security analysts by varying the analysts' degree of experience and risk tolerance as well as an attacker's strategy (impatient or patient attack).

The authors found that experienced, risk-averse analysts were less accurate at detecting threats in patient than in impatient attacks. "In a patient attack, when the attacker waits until the end to generate threats, the experiences in the analyst's memory that indicate an attack" are not as readily retrieved, says Dutt, which "makes it difficult to correctly detect patient attacks."

"Application of our results include the design of training tools that increase competency and the development of decision-support tools that improve defenders' on-the-job performance in detecting cyber attacks." The authors suggest that employers evaluate an analysts' risk tolerance before employment and/or manipulate tolerance levels during training to better identify threats.

As cyber warfare strategies and tactics evolve, the authors plan to further investigate the trend of drawn-out attacks and new intrusion detection software.

See the full Story via external site: www.eurekalert.org

Most recent stories in this category (Libraries and Components):

17/02/2015: New algorithms Geolocate a video from its images and sounds

25/03/2014: Parallel programming may not be so daunting

24/01/2014: Stanford scientists use 'virtual earthquakes' to forecast Los Angeles quake risk

14/04/2013: The mathematical method for simulating the evolution of the solar system has been improved by UPV/EHU researchers

13/02/2013: 3D Printing on the Micrometer Scale

07/02/2013: Gap geometry grasped: A new algorithm could help understand the structure of liquids, and how they flow through porous media

03/12/2012: The advantages of 3D printing are now being put to the test in soil science laboratories

02/12/2012: Preventing 'Cyber Pearl Harbor'