All too often we find ourselves with the next technology that will solve all the problems. In the end, it just ends up being the next buzzword attached to research efforts without actually solving the problems, or adapting the technology in the ways it was intended. 5G, if we treat its innovations correctly, can break this pattern.
KEYWORDS: Systems modeling, Information security, Feature extraction, Data modeling, Ecosystems, Data processing, Visualization, Time metrology, Organisms, Machine learning
Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible
types of applications yet specific enough to capture the application and attack specific details. As a result we
are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art
methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these
evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These
evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system
configuration, hardware and software flaws, or operational weaknesses.
We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity
(IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides
a broad base measure through a collection of application and system specific metrics. In this paper, following the
example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of
a system under test in a cyber-environment.
KEYWORDS: Cognitive modeling, Network security, Computer security, Information security, Control systems, Clouds, Computing systems, Defense and security, Internet, Information assurance
Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends the state-of-the-art in enterprise anti-exploitation technologies by providing collective immunity through backup and cross-checking, proactive health monitoring and adaptive/autonomic threat response, and network resource diversity.
Conference Committee Involvement (9)
Disruptive Technologies in Information Sciences VI
4 April 2022 | Orlando, Florida, United States
Disruptive Technologies in Information Sciences V
12 April 2021 | Online Only, Florida, United States
Disruptive Technologies in Information Sciences IV
27 April 2020 | Online Only, California, United States
Disruptive Technologies in Information Sciences III
15 April 2019 | Baltimore, MD, United States
Disruptive Technologies in Information Sciences
17 April 2018 | Orlando, FL, United States
Disruptive Technologies in Sensors and Sensor Systems
11 April 2017 | Anaheim, CA, United States
Machine Intelligence and Bio-inspired Computation: Theory and Applications X
20 April 2016 | Baltimore, MD, United States
Machine Intelligence and Bio-inspired Computation: Theory and Applications IX
21 April 2015 | Baltimore, MD, United States
Machine Intelligence and Bio-inspired Computation: Theory and Applications VIII
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.