skip to main content


Title: SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security
Cyber situational awareness is an essential part of cyber defense that allows the cybersecurity operators to cope with the complexity of today’s networks and threat landscape. Perceiving and comprehending the situation allow the operator to project upcoming events and make strategic decisions. In this paper, we recapitulate the fundamentals of cyber situational awareness and highlight its unique characteristics in comparison to generic situational awareness known from other fields. Subsequently, we provide an overview of existing research and trends in publishing on the topic, introduce front research groups, and highlight the impact of cyber situational awareness research. Further, we propose an updated taxonomy and enumeration of the components used for achieving cyber situational awareness. The updated taxonomy conforms to the widely-accepted three-level definition of cyber situational awareness and newly includes the projection level. Finally, we identify and discuss contemporary research and operational challenges, such as the need to cope with rising volume, velocity, and variety of cybersecurity data and the need to provide cybersecurity operators with the right data at the right time and increase their value through visualization.  more » « less
Award ID(s):
1742789
NSF-PAR ID:
10190270
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
Proceedings of 2020 International Conference on Availability, Reliability and Security (ARES)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. K-12 teachers and students are vulnerable to cybersecurity attacks and mostly ill-prepared to deal with them. The CO- VID-19 pandemic has only increased these risks because of the reliance on digital technology in education and increased free time young children and adolescents spend online. Simultaneously, the U.S. is facing an extreme shortage of cybersecurity professionals. Given the rise of cyberattacks and the need for cybersecurity professionals, a concerted effort to prepare preservice teachers to integrate cybersecurity education across the K-12 curriculum is needed. In our vision for 2025, all preservice teachers across the country are prepared to integrate age-appropriate cybersecurity concepts, skills and career awareness in the curriculum regardless of their content area or grade level specialization. We propose a repository of stand-alone activities and full curricula developed through collaboration among K-12 educators, teacher educators, and cybersecurity experts that could be adopted across teacher education programs. We use the elementary grades as a con- text for providing examples of some activities that might be included in the repository. We also provide recommendations for developing such a repository and for individual teacher educators who want integrate cybersecurity education in pre-service teacher education right now. 
    more » « less
  2. Abstract

    There is a need for nowcasting tools to provide timely and accurate updates on the location and rate of spread (ROS) of large wildfires, especially those impacting communities in the wildland urban interface. In this study, we demonstrate how fixed‐site weather radars can be used to fill this gap. Specifically, we develop and test a radar‐based fire‐perimeter tracking tool that leverages the tendency for local maxima in the radar reflectivity to be collocated with active fire perimeters. Reflectivity maxima are located using search radials from points inside a fire polygon, and perimeters are updated at intervals of ∼10 min. The algorithm is tested using publicly available Next Generation Weather Radar radar data for two large and destructive wildfires, the Camp and Bear Fires, both occurring in northern California, USA. The radar‐based fire perimeters are compared with available, albeit limited, satellite and airborne infrared observations, showing good agreement with conventional fire‐tracking tools. The radar data also provide insights into fire ROS, revealing the importance of long‐range spotting in generating ROS that exceeds conventional estimates. One limitation of this study is that high‐resolution fire perimeter validation data are sparsely available, precluding detailed error quantification for the radar estimates drawn from samples spanning a range of environmental conditions and radar configurations. Nevertheless, the radar tracking approach provides the basis for improved situational awareness during high‐impact fires.

     
    more » « less
  3. Mobile cellular network operators spend nearly a quarter of their revenue on network management and maintenance. Incidentally, a significant proportion of that budget is spent on resolving outages that degrade or disrupt cellular services. Historically, operators mainly rely on human expertise to identify, diagnose, and resolve such outages. However, with growing cell density and diversifying cell types, this approach is becoming less and less viable, both technically and financially. To cope with this problem, research on self-healing solutions has gained significant momentum in recent years. Self-healing solutions either assist in resolving these outages or carry out the task autonomously without human intervention, thus reducing costs while improving mobile cellular network reliability. However, despite their growing popularity, to this date no survey has been undertaken for self-healing solutions in mobile cellular networks. This paper aims to bridge this gap by providing a comprehensive survey of self-healing solutions proposed in the domain of mobile cellular networks, along with an analysis of the techniques and methodologies employed in those solutions. This paper begins by providing a quantitative analysis to highlight why in emerging mobile cellular network self-healing will become a necessity instead of a luxury. Building on this motivation, this paper provides a review and taxonomy of existing literature on self-healing. Challenges and prospective research directions for developing self-healing solutions for emerging and future mobile cellular networks are also discussed in detail. Particularly, we identify that the most demanding challenges from self-healing perspective are the difficulty of meeting 5G low latency and the high quality of experience requirement. 
    more » « less
  4. Cybersecurity workforce development is the key to protecting information and information systems, and yet more than 30% of companies are short on security expertise. To address this need, the current authors have developed four cybersecurity education games to teach social engineering, secure online behavior, cyber defense methods, and cybersecurity first principles. These games are intended to recruit the next generation cybersecurity workforce by developing an innovative cybersecurity curriculum and pedagogical methods to provide high school students with hands-on activities in a game-based learning environment. Purdue University Northwest (PNW) offered high school summer camps for 181 high school students in June of 2016 and June of 2017. Out of 181 high school participants, 107 were underrepresented minority students, including African Americans, Hispanics, Asians, and Native Americans. To evaluate the effectiveness of the cybersecurity education games, post-camp surveys were conducted with 154 camp participants. The survey results indicated that the games were very effective in cybersecurity awareness training. Furthermore, the cybersecurity education games were more effective for male students than female students in raising student interest in computer science and cybersecurity. 
    more » « less
  5. This article examines the integration of cybersecurity into the sociology curriculum at a HBCU. The article is based on two of the twenty-six modules that were created and taught in a three-year project. The research questions are: • Is there increased cybersecurity awareness after the infusion of the Password and Phishing Modules? • Is there a relationship between the use of experiential pedagogy and learning outcomes? The socio-cybersecurity modules are grounded in Vygotsky’s experiential learning theory. The methodology included a pre-test survey of cybersecurity awareness, the module’s lecture and experiential activities, then a post-test survey of cybersecurity awareness. T-test analysis was performed on the data obtained from quasi-experimental survey data. Content analysis was performed on in-class assignments. Students found the experiential pedagogy helpful and demonstrated their new knowledge. Significant pedagogical research is occurring with African American students. Traditionally, this population has been sidelined in the digital race and its new employment opportunities. When exposed to cyber-education their learning outcomes are primarily significant. 
    more » « less