Integration of external data sources with cyber security data warehouse

Bogdan D. Czejdo, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, John R. Goodall

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

In this paper we discuss problems related to integration of external knowledge and data components with a cyber security data warehouse to improve situational understanding of enterprise networks. More specifically, network assessment and trend analysis can be enhanced by knowledge about most current vulnerabilities and external network events. The cyber security data warehouse can be modeled as a hierarchical graph of aggregations that captures data at multiple scales. Nodes of the graph, which are summarization tables, can be linked to external sources of information. We discuss problems related to timely information about vulnerabilities and how to integrate vulnerability ontology with cyber security network data. Copyright is held by the owner/author(s).

Original languageEnglish
Title of host publicationProceedings of 2014 9th Annual Cyber and Information Security Research Conference, CISRC 2014
PublisherAssociation for Computing Machinery
Pages49-52
Number of pages4
ISBN (Print)9781450328128
DOIs
StatePublished - 2014
Event9th Annual Cyber and Information Security Research Conference, CISRC 2014 - Oak Ridge, TN, United States
Duration: Apr 8 2014Apr 10 2014

Publication series

NameACM International Conference Proceeding Series

Conference

Conference9th Annual Cyber and Information Security Research Conference, CISRC 2014
Country/TerritoryUnited States
CityOak Ridge, TN
Period04/8/1404/10/14

Keywords

  • Aggregation
  • Anomaly detection
  • Cyber security
  • Natural language processing
  • Network intrusion
  • Situational understanding
  • Vulnerability
  • Vulnerability ontology

Fingerprint

Dive into the research topics of 'Integration of external data sources with cyber security data warehouse'. Together they form a unique fingerprint.

Cite this