A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights

Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) syste...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM computing surveys 2022-12, Vol.55 (5), p.1-37, Article 107
Hauptverfasser: Alavizadeh, Hooman, Jang-Jaccard, Julian, Enoch, Simon Yusuf, Al-Sahaf, Harith, Welch, Ian, Camtepe, Seyit A., Kim, Dan Dongseong
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 37
container_issue 5
container_start_page 1
container_title ACM computing surveys
container_volume 55
creator Alavizadeh, Hooman
Jang-Jaccard, Julian
Enoch, Simon Yusuf
Al-Sahaf, Harith
Welch, Ian
Camtepe, Seyit A.
Kim, Dan Dongseong
description Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed that has the ability of monitoring and capturing various types of threats, analyzing, and devising a plan to avoid further attacks. This article provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis of the techniques, and evaluation methods. Last, we highlight misconceptions, insights, and limitations of this study and suggest some future work directions to address the limitations.
doi_str_mv 10.1145/3530809
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2817774651</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2817774651</sourcerecordid><originalsourceid>FETCH-LOGICAL-a272t-810d8bea627b733a24dd7309674a827e586056aeb098c4329eda54b180ea4e553</originalsourceid><addsrcrecordid>eNo90E1Lw0AQBuBFFKxVvHta8OCl0dmv7NZbKVYLBcHWc5gkU5tqkrqbWPLvbWn1NId5eGd4GbsWcC-ENg_KKHAwPGE9YYyNrNLilPVAxRCBAjhnFyGsAUBqEffY24jPW_9DHa8rPu5S8nxeNC02RV1FuEVPFYXA511oqAyPfOKxpG3tPwd8QdmqKr5bCgOOVc6nVSg-Vk24ZGdL_Ap0dZx99j55Woxfotnr83Q8mkUorWwiJyB3KWEsbWqVQqnz3CoYxlajk5aMi8HESCkMXaaVHFKORqfCAaEmY1Sf3R5yN77ef9Ek67r11e5kIp2w1urYiJ26O6jM1yF4WiYbX5Tou0RAsi8sORa2kzcHiVn5j_6Wv33wY6I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2817774651</pqid></control><display><type>article</type><title>A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights</title><source>ACM Digital Library Complete</source><creator>Alavizadeh, Hooman ; Jang-Jaccard, Julian ; Enoch, Simon Yusuf ; Al-Sahaf, Harith ; Welch, Ian ; Camtepe, Seyit A. ; Kim, Dan Dongseong</creator><creatorcontrib>Alavizadeh, Hooman ; Jang-Jaccard, Julian ; Enoch, Simon Yusuf ; Al-Sahaf, Harith ; Welch, Ian ; Camtepe, Seyit A. ; Kim, Dan Dongseong</creatorcontrib><description>Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed that has the ability of monitoring and capturing various types of threats, analyzing, and devising a plan to avoid further attacks. This article provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis of the techniques, and evaluation methods. Last, we highlight misconceptions, insights, and limitations of this study and suggest some future work directions to address the limitations.</description><identifier>ISSN: 0360-0300</identifier><identifier>EISSN: 1557-7341</identifier><identifier>DOI: 10.1145/3530809</identifier><language>eng</language><publisher>New York, NY: ACM</publisher><subject>Computer science ; Cybersecurity ; Intrusion detection systems ; Network security ; Security and privacy ; Situational awareness ; Threat evaluation</subject><ispartof>ACM computing surveys, 2022-12, Vol.55 (5), p.1-37, Article 107</ispartof><rights>Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from</rights><rights>Copyright Association for Computing Machinery May 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a272t-810d8bea627b733a24dd7309674a827e586056aeb098c4329eda54b180ea4e553</citedby><cites>FETCH-LOGICAL-a272t-810d8bea627b733a24dd7309674a827e586056aeb098c4329eda54b180ea4e553</cites><orcidid>0000-0001-6353-8359 ; 0000-0002-0970-3621 ; 0000-0002-1002-057X ; 0000-0003-4633-6135 ; 0000-0002-5968-182X ; 0000-0003-2605-187X ; 0000-0002-0033-6706</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3530809$$EPDF$$P50$$Gacm$$H</linktopdf><link.rule.ids>314,777,781,2276,27905,27906,40177,75977</link.rule.ids></links><search><creatorcontrib>Alavizadeh, Hooman</creatorcontrib><creatorcontrib>Jang-Jaccard, Julian</creatorcontrib><creatorcontrib>Enoch, Simon Yusuf</creatorcontrib><creatorcontrib>Al-Sahaf, Harith</creatorcontrib><creatorcontrib>Welch, Ian</creatorcontrib><creatorcontrib>Camtepe, Seyit A.</creatorcontrib><creatorcontrib>Kim, Dan Dongseong</creatorcontrib><title>A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights</title><title>ACM computing surveys</title><addtitle>ACM CSUR</addtitle><description>Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed that has the ability of monitoring and capturing various types of threats, analyzing, and devising a plan to avoid further attacks. This article provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis of the techniques, and evaluation methods. Last, we highlight misconceptions, insights, and limitations of this study and suggest some future work directions to address the limitations.</description><subject>Computer science</subject><subject>Cybersecurity</subject><subject>Intrusion detection systems</subject><subject>Network security</subject><subject>Security and privacy</subject><subject>Situational awareness</subject><subject>Threat evaluation</subject><issn>0360-0300</issn><issn>1557-7341</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNo90E1Lw0AQBuBFFKxVvHta8OCl0dmv7NZbKVYLBcHWc5gkU5tqkrqbWPLvbWn1NId5eGd4GbsWcC-ENg_KKHAwPGE9YYyNrNLilPVAxRCBAjhnFyGsAUBqEffY24jPW_9DHa8rPu5S8nxeNC02RV1FuEVPFYXA511oqAyPfOKxpG3tPwd8QdmqKr5bCgOOVc6nVSg-Vk24ZGdL_Ap0dZx99j55Woxfotnr83Q8mkUorWwiJyB3KWEsbWqVQqnz3CoYxlajk5aMi8HESCkMXaaVHFKORqfCAaEmY1Sf3R5yN77ef9Ek67r11e5kIp2w1urYiJ26O6jM1yF4WiYbX5Tou0RAsi8sORa2kzcHiVn5j_6Wv33wY6I</recordid><startdate>20221203</startdate><enddate>20221203</enddate><creator>Alavizadeh, Hooman</creator><creator>Jang-Jaccard, Julian</creator><creator>Enoch, Simon Yusuf</creator><creator>Al-Sahaf, Harith</creator><creator>Welch, Ian</creator><creator>Camtepe, Seyit A.</creator><creator>Kim, Dan Dongseong</creator><general>ACM</general><general>Association for Computing Machinery</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-6353-8359</orcidid><orcidid>https://orcid.org/0000-0002-0970-3621</orcidid><orcidid>https://orcid.org/0000-0002-1002-057X</orcidid><orcidid>https://orcid.org/0000-0003-4633-6135</orcidid><orcidid>https://orcid.org/0000-0002-5968-182X</orcidid><orcidid>https://orcid.org/0000-0003-2605-187X</orcidid><orcidid>https://orcid.org/0000-0002-0033-6706</orcidid></search><sort><creationdate>20221203</creationdate><title>A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights</title><author>Alavizadeh, Hooman ; Jang-Jaccard, Julian ; Enoch, Simon Yusuf ; Al-Sahaf, Harith ; Welch, Ian ; Camtepe, Seyit A. ; Kim, Dan Dongseong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a272t-810d8bea627b733a24dd7309674a827e586056aeb098c4329eda54b180ea4e553</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer science</topic><topic>Cybersecurity</topic><topic>Intrusion detection systems</topic><topic>Network security</topic><topic>Security and privacy</topic><topic>Situational awareness</topic><topic>Threat evaluation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alavizadeh, Hooman</creatorcontrib><creatorcontrib>Jang-Jaccard, Julian</creatorcontrib><creatorcontrib>Enoch, Simon Yusuf</creatorcontrib><creatorcontrib>Al-Sahaf, Harith</creatorcontrib><creatorcontrib>Welch, Ian</creatorcontrib><creatorcontrib>Camtepe, Seyit A.</creatorcontrib><creatorcontrib>Kim, Dan Dongseong</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM computing surveys</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alavizadeh, Hooman</au><au>Jang-Jaccard, Julian</au><au>Enoch, Simon Yusuf</au><au>Al-Sahaf, Harith</au><au>Welch, Ian</au><au>Camtepe, Seyit A.</au><au>Kim, Dan Dongseong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights</atitle><jtitle>ACM computing surveys</jtitle><stitle>ACM CSUR</stitle><date>2022-12-03</date><risdate>2022</risdate><volume>55</volume><issue>5</issue><spage>1</spage><epage>37</epage><pages>1-37</pages><artnum>107</artnum><issn>0360-0300</issn><eissn>1557-7341</eissn><abstract>Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed that has the ability of monitoring and capturing various types of threats, analyzing, and devising a plan to avoid further attacks. This article provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis of the techniques, and evaluation methods. Last, we highlight misconceptions, insights, and limitations of this study and suggest some future work directions to address the limitations.</abstract><cop>New York, NY</cop><pub>ACM</pub><doi>10.1145/3530809</doi><tpages>37</tpages><orcidid>https://orcid.org/0000-0001-6353-8359</orcidid><orcidid>https://orcid.org/0000-0002-0970-3621</orcidid><orcidid>https://orcid.org/0000-0002-1002-057X</orcidid><orcidid>https://orcid.org/0000-0003-4633-6135</orcidid><orcidid>https://orcid.org/0000-0002-5968-182X</orcidid><orcidid>https://orcid.org/0000-0003-2605-187X</orcidid><orcidid>https://orcid.org/0000-0002-0033-6706</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0360-0300
ispartof ACM computing surveys, 2022-12, Vol.55 (5), p.1-37, Article 107
issn 0360-0300
1557-7341
language eng
recordid cdi_proquest_journals_2817774651
source ACM Digital Library Complete
subjects Computer science
Cybersecurity
Intrusion detection systems
Network security
Security and privacy
Situational awareness
Threat evaluation
title A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T12%3A41%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20on%20Cyber%20Situation-awareness%20Systems:%20Framework,%20Techniques,%20and%20Insights&rft.jtitle=ACM%20computing%20surveys&rft.au=Alavizadeh,%20Hooman&rft.date=2022-12-03&rft.volume=55&rft.issue=5&rft.spage=1&rft.epage=37&rft.pages=1-37&rft.artnum=107&rft.issn=0360-0300&rft.eissn=1557-7341&rft_id=info:doi/10.1145/3530809&rft_dat=%3Cproquest_cross%3E2817774651%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2817774651&rft_id=info:pmid/&rfr_iscdi=true