Description
Current practices to defend against cyber attacks are typically reactive yet passive. Recent research work has been proposed to proactively predict hacker's target entities in the early stage of the attack. With prediction, there comes false alarms and missed attacks. Very little has been reported on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment algorithm is, perhaps more susceptible that for other application domains. This work sets forth the issues on evaluating cyber threat assessment algorithms, and discusses the validity of various statistical measures. Simulation examples are provided to illustrate the pros and cons of using different metrics under various cyber attack scenarios. Our results show that commonly used false positives and false negatives are necessary but not sufficient to evaluate cyber threat assessment.
Date of creation, presentation, or exhibit
10-2006
Document Type
Conference Paper
Department, Program, or Center
Computer Engineering (KGCOE)
Recommended Citation
S. J. Yang, J. Holsopple and M. Sudit, "Evaluating Threat Assessment for Multi-Stage Cyber Attacks," MILCOM 2006 - 2006 IEEE Military Communications conference, Washington, DC, 2006, pp. 1-7. doi: 10.1109/MILCOM.2006.302216
Campus
RIT – Main Campus
Comments
© 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in February 2014.