@inproceedings{944a300f3c164b46a0f5c61f7ccee594,
title = "Integration of external data sources with cyber security data warehouse",
abstract = "In this paper we discuss problems related to integration of external knowledge and data components with a cyber security data warehouse to improve situational understanding of enterprise networks. More specifically, network assessment and trend analysis can be enhanced by knowledge about most current vulnerabilities and external network events. The cyber security data warehouse can be modeled as a hierarchical graph of aggregations that captures data at multiple scales. Nodes of the graph, which are summarization tables, can be linked to external sources of information. We discuss problems related to timely information about vulnerabilities and how to integrate vulnerability ontology with cyber security network data. Copyright is held by the owner/author(s).",
keywords = "Aggregation, Anomaly detection, Cyber security, Natural language processing, Network intrusion, Situational understanding, Vulnerability, Vulnerability ontology",
author = "Czejdo, {Bogdan D.} and Iannacone, {Michael D.} and Bridges, {Robert A.} and Ferragut, {Erik M.} and Goodall, {John R.}",
year = "2014",
doi = "10.1145/2602087.2602098",
language = "English",
isbn = "9781450328128",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery",
pages = "49--52",
booktitle = "Proceedings of 2014 9th Annual Cyber and Information Security Research Conference, CISRC 2014",
note = "9th Annual Cyber and Information Security Research Conference, CISRC 2014 ; Conference date: 08-04-2014 Through 10-04-2014",
}