Reference Hub3
Information Data Fusion and Computer Network Defense

Information Data Fusion and Computer Network Defense

Mark Ballora, Nicklaus A. Giacobe, Michael McNeese, David L. Hall
ISBN13: 9781466601048|ISBN10: 1466601043|EISBN13: 9781466601055
DOI: 10.4018/978-1-4666-0104-8.ch009
Cite Chapter Cite Chapter

MLA

Ballora, Mark, et al. "Information Data Fusion and Computer Network Defense." Situational Awareness in Computer Network Defense: Principles, Methods and Applications, edited by Cyril Onwubiko and Thomas Owens, IGI Global, 2012, pp. 141-164. https://doi.org/10.4018/978-1-4666-0104-8.ch009

APA

Ballora, M., Giacobe, N. A., McNeese, M., & Hall, D. L. (2012). Information Data Fusion and Computer Network Defense. In C. Onwubiko & T. Owens (Eds.), Situational Awareness in Computer Network Defense: Principles, Methods and Applications (pp. 141-164). IGI Global. https://doi.org/10.4018/978-1-4666-0104-8.ch009

Chicago

Ballora, Mark, et al. "Information Data Fusion and Computer Network Defense." In Situational Awareness in Computer Network Defense: Principles, Methods and Applications, edited by Cyril Onwubiko and Thomas Owens, 141-164. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0104-8.ch009

Export Reference

Mendeley
Favorite

Abstract

Computer networks no longer simply enable military and civilian operations, but have become vital infrastructures for all types of operations ranging from sensing and command/control to logistics, power distribution, and many other functions. Consequently, network attacks have become weapons of choice for adversaries engaged in asymmetric warfare. Traditionally, data and information fusion techniques were developed to improve situational awareness and threat assessment by combining data from diverse sources, and have recently been extended to include both physical (“hard”) sensors and human observers (acting as “soft” sensors). This chapter provides an introduction to traditional data fusion models and adapts them to the domain of cyber security. Recent advances in hard and soft information fusion are summarized and applied to the cyber security domain. Research on the use of sound for human-in-the-loop pattern recognition (sonification) is also introduced. Finally, perspectives are provided on the future for data fusion in cyber security research.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.