Geo-Temporal Characterization of Security Threats - October 2014
Public Audience
Purpose: To highlight project progress. Information is generally at a higher level which is accessible to the interested public. All information contained in the report (regions 1-3) is a Government Deliverable/CDRL.
PI(s): Kathleen M. Carley
Co-PI(s):
Researchers:
HARD PROBLEM(S) ADDRESSED
This refers to Hard Problems, released November 2012.
Policy governed secure collaboration and resilient architectures.
Provides an empirical basis for assessment and validation of security models.
Provides a global model of flow of threats and associated information.
PUBLICATIONS
Technical Report
Ghita Mezzour, L. Richard Carley, Kathleen M. Carley, 2014, Global Mapping of Cyber Attacks, School of Computer Science, Institute for Software Research, Technical Report CMU-ISR-14-111
ACCOMPLISHMENT HIGHLIGHTS
- * Technical Report submitted
* Identified central core network
* Identified key actors attacking country of interest and being attacked by country of interest by type of attack.