One size does not fit all: 10 years of applying context-aware security

Sushant Sinha, Michael Bailey, Farnam Jahanian

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Defenders of today's critical cyber-infrastructure (e.g., the Internet) are equipped with a wide array of security techniques including network-based intrusion detection systems (IDS), host-based anti-virus systems (AV), and decoy or reconnaissance systems such as host-based honeypots or network-based telescopes. While effective at detecting and mitigating some of the threats posed to critical infrastructure, the ubiquitous nature of malicious activity (e.g., phishing, spam, DDoS) on the Internet indicates that the current deployments of these tools do not fully live up to their promise. Over the past 10 years our research group has investigated ways of detecting and stopping cyber-attacks by using the context available in the network, host, and the environment. In this paper, we explain what exactly we mean by context, why it is difficult to measure, and what one can do with context when it is available. We illustrate these points by examining several studies in which context was used to enable or enhance new security techniques. We conclude with some ideas about the future of context-aware security.

Original languageEnglish (US)
Title of host publication2009 IEEE Conference on Technologies for Homeland Security, HST 2009
Pages14-21
Number of pages8
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 IEEE Conference on Technologies for Homeland Security, HST 2009 - Waltham, MA, United States
Duration: May 11 2009May 12 2009

Publication series

Name2009 IEEE Conference on Technologies for Homeland Security, HST 2009

Other

Other2009 IEEE Conference on Technologies for Homeland Security, HST 2009
Country/TerritoryUnited States
CityWaltham, MA
Period5/11/095/12/09

ASJC Scopus subject areas

  • Geography, Planning and Development
  • Law
  • Public Administration

Fingerprint

Dive into the research topics of 'One size does not fit all: 10 years of applying context-aware security'. Together they form a unique fingerprint.

Cite this