Publications

Publications / Conference Poster

Linkography ontology refinement and cyber security

Mitchell, Robert; Fisher, Andrew; Watson, Scott; Jarocki, John

The competition between cyber attackers and defenders is fundamentally a game. In this game, the stakes are high, the decisions are difficult and the timescale is very short. To date, most researchers in this area have focused on the strategic level decisions. This focus enables what-if scenarios that hinge on the opening move of the game. However, this approach does not allow for flexibility after the players choose these high-level opening moves. We compare this situation to a turn-based style of play where we hope to end the game quickly, for example, by halting the execution of a software program when we detect a signature that matches some definition of malicious.