59 research outputs found

    Malware in the Future? Forecasting of Analyst Detection of Cyber Events

    Full text link
    There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated intrusion detection/prevention systems. This research has uncovered key insights such as systematicity in cyber attacks. Here, we propose an alternate perspective of this problem by performing forecasting of attacks that are analyst-detected and -verified occurrences of malware. We call these instances of malware cyber event data. Specifically, our dataset was analyst-detected incidents from a large operational Computer Security Service Provider (CSSP) for the U.S. Department of Defense, which rarely relies only on automated systems. Our data set consists of weekly counts of cyber events over approximately seven years. Since all cyber events were validated by analysts, our dataset is unlikely to have false positives which are often endemic in other sources of data. Further, the higher-quality data could be used for a number for resource allocation, estimation of security resources, and the development of effective risk-management strategies. We used a Bayesian State Space Model for forecasting and found that events one week ahead could be predicted. To quantify bursts, we used a Markov model. Our findings of systematicity in analyst-detected cyber attacks are consistent with previous work using other sources. The advanced information provided by a forecast may help with threat awareness by providing a probable value and range for future cyber events one week ahead. Other potential applications for cyber event forecasting include proactive allocation of resources and capabilities for cyber defense (e.g., analyst staffing and sensor configuration) in CSSPs. Enhanced threat awareness may improve cybersecurity.Comment: Revised version resubmitted to journa

    Skin -To-Skin Contact After Cesarean Delivery.

    Get PDF
    1. Skin to Skin Brittany Cerino, BSN, RN, Julia Gogle, MSN, RNC-OB and Roxann Wagner, MSN, RNC-NI

    Characterization of vascular strain during in-vitro angioplasty with high-resolution ultrasound speckle tracking

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Ultrasound elasticity imaging provides biomechanical and elastic properties of vascular tissue, with the potential to distinguish between tissue motion and tissue strain. To validate the ability of ultrasound elasticity imaging to predict structurally defined physical changes in tissue, strain measurement patterns during angioplasty in four bovine carotid artery pathology samples were compared to the measured physical characteristics of the tissue specimens.</p> <p>Methods</p> <p>Using computational image-processing techniques, the circumferences of each bovine artery specimen were obtained from ultrasound and pathologic data.</p> <p>Results</p> <p>Ultrasound-strain-based and pathology-based arterial circumference measurements were correlated with an R<sup>2 </sup>value of 0.94 (p = 0.03). The experimental elasticity imaging results confirmed the onset of deformation of an angioplasty procedure by indicating a consistent inflection point where vessel fibers were fully unfolded and vessel wall strain initiated.</p> <p>Conclusion</p> <p>These results validate the ability of ultrasound elasticity imaging to measure localized mechanical changes in vascular tissue.</p

    Cyber security incident handling, warning and response system for the european critical information infrastructures (cyberSANE)

    Get PDF
    This paper aims to enhance the security and resilience of Critical Information Infrastructures (CIIs) by providing a dynamic collaborative, warning and response system (CyberSANE system) supporting and guiding security officers and operators (e.g. Incident Response professionals) to recognize, identify, dynamically analyse, forecast, treat and respond to their threats and risks and handle their daily cyber incidents. The proposed solution provides a first of a kind approach for handling cyber security incidents in the digital environments with highly interconnected, complex and diverse nature

    CSIRTs and Global Cybersecurity: How Technical Experts Support Science Diplomacy

    Get PDF
    Ongoing efforts by state actors to collaborate on addressing the challenges of global cybersecurity have been slow to yield results. Technical expert communities such as Computer Security and Incident Response Teams (CSIRTs) have played a fundamental role in maintaining the Internet's functional structure through transnational collaboration. Responsible for security incident management and located in diverse constituencies, these coordination centres engage in joint responses and solve day‐to‐day cybersecurity problems through diverse national, regional and international networks. This article argues that CSIRTs form an epistemic community that engages in science diplomacy, at times navigating geopolitical tensions in a way that political actors are not able to. Through interviews with CSIRT representatives, we explain how their collaborative actions, rooted in shared technical knowledge, norms and best practices, contribute to the advancement of international cooperation on cybersecurity

    Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide

    No full text

    Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide

    No full text
    corecore