Sensor fusion and automatic vulnerability analysis

  • Authors:
  • Rayford B. Vaughn;John Farrell;Ronda Henning;Margaret Knepper;Kevin Fox

  • Affiliations:
  • Mississippi State University;Harris Corporation;Harris Corporation;Harris Corporation;Harris Corporation

  • Venue:
  • WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security analysis of networked computing systems continues to present a challenge. The growing complexity of network and computing systems, the increasing sophistication of computer attacks, and the limited supply of security specialist make automated security solutions a necessity. A number of independent solutions are often suggested for a system and then implemented as independent sensors. Little work has been done in fusing sensor outputs in a meaningful way in order to recognize an attack in progress in time to mitigate its impact.