Towards incorporating human intelligence into online security solutions

Saman Zonouz, Robin Berthier, Negin Arhami

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The design of automated online security and intrusion tolerance solutions for computer systems and networks is a theoretically achievable objective. However, after two decades of research, this objective has still not yet successfully passed the practicality test to become widely adopted. We believe that the main reason behind this gap lies in the misleading definition of autonomous security that precludes human intervention in trying to achieve unrealistic level of full automation. In this position paper, we discuss a novel research direction to address this challenge through a coherent integration of human intelligence. In particular, we identify the key questions to be answered in order to enable human intelligence to be leveraged in a seamless manner and without requiring explicit heavy human involvements. We illustrate our discussion through the preliminary design of a semi-automated intrusion detection and response system that incorporates reasonable human input to achieve higher levels of intrusion tolerance efficiency.

Original languageEnglish (US)
Title of host publication2012 IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops, DSN-W 2012
DOIs
StatePublished - Dec 1 2012
Event2012 IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops, DSN-W 2012 - Boston, MA, United States
Duration: Jun 25 2012Jun 28 2012

Publication series

NameProceedings of the International Conference on Dependable Systems and Networks

Other

Other2012 IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops, DSN-W 2012
CountryUnited States
CityBoston, MA
Period6/25/126/28/12

Keywords

  • collaborative filtering
  • Online intrusion detection and response
  • system security visualization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint Dive into the research topics of 'Towards incorporating human intelligence into online security solutions'. Together they form a unique fingerprint.

Cite this