• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ Intrusion Detection

Topic: Intrusion Detection

Digest Article

Most Concerning Security Controls for Cyberattackers? Deception and IDS

Posted: 01/08/2019 | Leave a Comment

Attivo Networks surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and what's on their 2019 security wish list. Read More

Journal Article

Providing Cyber Situational Awareness on Defense Platform Networks

Published in Journal of Cyber Security and Information Systems
Volume: 6 Number: 3 - Innovation Based Ecosystems

Authors: Patrick M. Hayden, David K. Woolrich and Katie D. Sobolewski, ...
Posted: 11/01/2018 | Leave a Comment

Modern defense platforms are at increasing risk of cyber-attack from sophisticated adversaries. These platforms do not currently provide the situational awareness necessary to identify when they are under cyber-attack, nor to detect that a constituent subsystem may be in a compromised state. Long-term improvements can be made to the security posture of these Read More

Journal Article

Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments

Published in Journal of Cyber Security and Information Systems
Volume: 6 Number: 3 - Innovation Based Ecosystems

Author: Alfredo Hickman
Posted: 11/01/2018 | Leave a Comment

The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves well to the conventional application of methods for conducting intrusion detection and analysis in traditional physical and virtual machine networks. While similarities exist in some of the methods used to perform Read More

CSIAC Webinar

Democratize Anomaly Detection Technologies: Challenges, Advances, and Opportunities

Posted: 05/16/2017 | Presenter: Danfeng (Daphne) Yao | Leave a Comment

The mature signature-based intrusion detection technology has been the first line of defense in the cyberspace. However, due to the perpetual cat-and-mouse game and asymmetry natures of cybersecurity, high-risk assets susceptible to advanced persistent threats need to be equipped with proactive defense mechanisms, beyond the conventional reactive Read More

Journal Article

Information Security Continuous Monitoring (ISCM)

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Authors: Akhilomen Oniha, Greg Weaver, Curtis Arnold, ...
Posted: 01/26/2017 | Leave a Comment

The ability for commanders to know and understand an organizational attack surface, its vulnerabilities, and associated risks is a fundamental aspect of command decision-making. In the cyberspace domain, ongoing monitoring sufficient to ensure and assure effectiveness of security controls related to systems, networks, and cyberspace, by assessing security Read More

Pages: Page 1 Page 2 Page 3 Page 4
Journal Article

Security of Cyber-Physical Systems

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Author: Dr. Edward Colbert
Posted: 01/26/2017 | Leave a Comment

Cyber Physical Systems (CPSs) are electronic control systems that control physical machines such as motors and valves in an industrial plant. In a networked environment, the security of the physical machines depends on the security of the electronic control systems, but cybersecurity is not typically the main design concern. The main concern for CPSs is the Read More

Pages: Page 1 Page 2 Page 3 Page 4 Page 5
Journal Article

Synergistic Architecture for Human-Machine Intrusion Detection

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Authors: Dr. Noam Ben-Asher and Paul Yu
Posted: 01/26/2017 | Leave a Comment

Abstract Modern day detection of cyber threats is a highly manual process where teams of human analysts flag suspicious events while using assistive tools such as Bro and Snort. It is the analysts’ ability to discern suspicious activity and authority to make decisions on threats that place humans into central roles in the threat detection process. However, Read More

Pages: Page 1 Page 2 Page 3 Page 4
Journal Article

Machine Learning and Network Intrusion Detection: Results from Grammatical Inference

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Author: Dr. Richard Harang
Posted: 01/23/2017 | Leave a Comment

Machine learning for network intrusion detection is an area of ongoing and active research (see references in [1] for a representative selection), however nearly all results in this area are empirical in nature, and despite the significant amount of work that has been performed in this area, very few such systems have received nearly the widespread support Read More

Pages: Page 1 Page 2 Page 3
Journal Article

The Cyber Security Collaborative Research Alliance: Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Authors: Patrick McDaniel and Ananthram Swami
Posted: 01/23/2017 | Leave a Comment

Abstract: For military networks and systems, the cyber domain is ever-increasingly contested and congested space. Defenders of these systems must fight through adversary action in complex tactical and strategic environments. Just now completing its third year, the Cyber-Security Collaborative Research Alliance has sought to develop approaches for Read More

Pages: Page 1 Page 2 Page 3 Page 4 Page 5 Page 6
Journal Article

Cyber Science and Technology at the Army Research Laboratory

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Author: Dr. Alexander Kott
Posted: 01/23/2017 | Leave a Comment

The U.S. Army Research Laboratory (ARL) received the first salvos in the battle for cybersecurity as early as three decades ago. In terms of technology history, it was an astonishingly long time ago. Before most people ever heard of the Internet. Before there were web browsers. Long before the smartphones. Back in 1986, the laboratory withstood attacks by Read More

Pages: Page 1 Page 2
  • Go to page 1
  • Go to page 2
  • Go to Next Page »
Air Force Research Laboratory (AFRL) Apple Artificial Intelligence (AI) Autonomy and Autonomous Systems Biometrics Cloud Computing Critical Infrastructure Protection (CIP) Cryptocurrency Cryptography cyberattack Cyber Legislation Cyber Physical Systems (CPSs) Cybersecurity Training Cyberwarfare Cyber Workforce Data Privacy Data Security Defense Modeling & Simulation Coordination Office (DMSCO) Defense Technical Information Center (DTIC) DoD Acquisition Lifecycle Encryption Industrial Control Systems (ICS) Insider Threat Internet of Things (IoT) Intrusion Detection Linux Machine Learning (ML) Malware Microsoft Mobile Security National Cyber Security Awareness Month (NCSAM) National Institute of Standards and Technology (NIST) Network Security Open Source Software Operational Technology (OT) Password Security Phishing Protecting Controlled Unclassified Information (CUI) Quantum Computing Ransomware Risk Management Framework (RMF) Secure Software Software Assurance Vulnerability Workplace Security

sidebar

Blog Sidebar

Featured Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

Featured Subject Matter Expert (SME): Richard "Rick" Aldrich

CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives updated snapshots of evolving developments in cyberlaw, policy, standards, court cases and industry legal frameworks. His latest work discusses cybersecurity issues of interest to security managers.

Read SME's Contributed Content

CSIAC Journal - Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)

CSIAC Journal Cover Volume 7 Number 2

This edition of the CSIAC Journal focuses on the topic of cybersecurity of Cyber-Physical Systems (CPS), particularly those that make up Critical Infrastructure (CI).

Read the Journal

CSIAC Journal - Artificial Intelligence

CSIAC Journal Cover Volume 7 Number 1

This edition of the CSIAC Journal highlights three very different views of complex situations where AI might, should, and does intersect with our ability to use AI effectively.

Read the Journal

Recent Video Podcasts

  • 5 Best Practices for Software Security Series: The CSIAC Podcast
  • Authenticating Devices in Fog Multi-Access Computing Environments through a Wireless Grid Resource Sharing Protocol Series: The CSIAC Podcast
  • Machine-Learning Techniques to Protect Critical Infrastructure From Cybersecurity Incidents or Equipment Incidents Series: CSIAC Webinars
  • Cyber Deconflicted: Understanding the Layers of Cyberspace Series: CSIAC Webinars
  • Security-Conscious Password Behavior from the End-User’s Perspective Series: The CSIAC Podcast
View all Podcasts

Upcoming Events

Fri 06

I/ITSEC 2019 – Interservice/ Industry Training, Simulation and Education Conference

December 2 - December 6
Orlando FL
United States
Feb 12

DeveloperWeek SF Bay Area

February 12, 2020 - February 16, 2020
San Francisco CA
United States
Feb 23

BSidesSF

February 23, 2020 - February 24, 2020
San Francisco CA
United States
Feb 29

BSidesTampa

February 29, 2020
Tampa FL
United States
Jun 15

QCon New York

June 15, 2020 - June 19, 2020
New York City NY
United States
View all Events

Recently Active Members

Profile picture of Zane
Profile picture of jlinenfelser
Profile picture of Ty1906
Profile picture of TTScompliance
Profile picture of demetriust
Profile picture of MRainwater
Profile picture of howellvl
Profile picture of rtmoran
Profile picture of zbadawi12
Profile picture of stersigni
Profile picture of jawalen
Profile picture of jreade
Profile picture of vbayless
Profile picture of RSqualls
Profile picture of krasneskyrl
Profile picture of asresch
Profile picture of securepoint
Profile picture of Kaysee112

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
USD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2019, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Necessary Always Enabled