{"componentChunkName":"component---src-templates-blog-template-blog-template-js","path":"/metrics-recommendation-for-cyber-common-operating-picture","result":{"data":{"markdownRemark":{"fields":{"dateSlug":"2020-07-01","id":"metrics-recommendation-for-cyber-common-operating-picture-2020-07-01"},"frontmatter":{"title":"Metrics Recommendation for Cyber Common Operating Picture","categories":["project"],"date":"July 1, 2020","tags":["project","distributed_ledger"],"type":"project","author1":"Nguyen Khoi Tran","author1_image":{"childImageSharp":{"fluid":{"base64":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAUCAYAAACNiR0NAAAACXBIWXMAAA7EAAAOxAGVKw4bAAAEYklEQVQ4y32UfVBUZRSH98+aEpHEciZN+VIE0UpQF1gEBK1JJI00R4TFFFQkQeVLWdRFgQWJHBhFAY1VKcTvWsIaPsSixrIcUZBosxHJD6zIAdll9z69dwlrRvHMnDlz733f5/5+533nKAbMZkkkcjX19yPHlctXUM6YzRiHF7Eb4YDDyNGMsnPgBfvROI5yxO7ZESxdtISHvX1YLBbMg/ttqfg/UK5IEjGRal6ysyc6NJj1YW+yKjTIluogFQFT3BkzchQjnnme6k+qbAL6hZDHgGaTSZJh9+/dY4bHNDYsCsdYWcqv+iJuVBRhrCimo7yQ5px0VgYHYP+cPRFvRyBZrY9gjwNFtLVcw3OiC4dTE7lz+jAdBwtpLy0QuZuOA/l0luVzLDmesfYOzPGfg9wmy8DA8MCO6+2ovKZTV5iDQaflZGYK7Yf2Yvy4mObdWuq1qTRqU3BxdCR84SKb5Sf3UAAtwnJvVyfboiI5tC2DrVEriAoJZu+61egT44l/IxTNu4upTv4AH6cJhIWEgtXyZMsD5kHgw7u3qSnQUVuQS2liAmkR7xAdGMAKlR+rQuayZfFC8mIiifD3Y//KaKx9fQxYLE8+ZfkKPOzpwXj2OBeK91CfreXEllS++0iHYVsap9OT+SZvF4acLI4kxHFJXz5o2WQa/trI0K6mOi4Vf4hhawpVG+JpyM2iVpPKAaGsZoeGhhwt53du4f71a0hPA8ofrGJBd3srjdmZVCXEUpkUT3HUMirWvM9nonc16UnUpm+g5cxxrFZJbtVwPfxPoWz7h5I9nEyKY786ihphu3LdWvTrY2nKzqAxfxc99+4iePJhPh0oq5Rt/NzUQF1mEuc2JVCpjuGMsP59wXZOp6znfHnJY70bFvgohdLW2rM06TJozt/Bt3kZVG9eQ8mqZTToMum+1WWDyhfbNGwPRZUXmE2DQ6K77SqnNMkUxarJWhpOkXoJ57Wb6G5u5ODeMr6qOcdQyGrlvYqhwxAPklWoGormC82cO3acn/QH2Lc2hpLVkXyt03CzqZ7+nl42x29k1vRZ6Msq+M14wzZU5FAMDQURUu/fD/jSUEt2RhbByiBOVJ1C+vMvrh4ppVVfwp2WFnp7+jC2tKGaqcLTzQuvSdPwmT6T2OjV1H7+BQoZdPf321Qf/lSKeS+aEN+5hIcsQOXjz9WLP2K8cZuUnaXkFVVy6+Yd8dd+Th2txmW8Kx6uU/Gc5MWEl50YbT8GV/FOka/NlZaFL8XvNaXk97ov8+fMI3h2IHFRsfxxs4uNmiI8wpIZFxhHYqoOS88Ddml2Mn7sBKYKdZOc3HEa58LEcc68IsAK76neKAXMd4avUKVifsA8lK/ORrcjFx70sr/8BJPf2oh/WCz1hjo6WztYHrEc5/FuNsuTnT1sUGehzk1UhfAvzRQ98J7mIwUpA/8FKjlaphej2Mz2fQZcFqSxWJ1GZ9svtF68jK+3P1NcPHF3GYS5TZyMu6snU0T+A4mApQzbrJS8AAAAAElFTkSuQmCC","aspectRatio":1,"src":"/static/5e71ca9a49d0d0118050abee263f3a14/3ad35/nguyen.png","srcSet":"/static/5e71ca9a49d0d0118050abee263f3a14/389c4/nguyen.png 25w,\n/static/5e71ca9a49d0d0118050abee263f3a14/ff572/nguyen.png 50w,\n/static/5e71ca9a49d0d0118050abee263f3a14/3ad35/nguyen.png 100w,\n/static/5e71ca9a49d0d0118050abee263f3a14/c81a9/nguyen.png 150w,\n/static/5e71ca9a49d0d0118050abee263f3a14/3bd35/nguyen.png 160w","srcWebp":"/static/5e71ca9a49d0d0118050abee263f3a14/9b9e3/nguyen.webp","srcSetWebp":"/static/5e71ca9a49d0d0118050abee263f3a14/6a2f6/nguyen.webp 25w,\n/static/5e71ca9a49d0d0118050abee263f3a14/9bc73/nguyen.webp 50w,\n/static/5e71ca9a49d0d0118050abee263f3a14/9b9e3/nguyen.webp 100w,\n/static/5e71ca9a49d0d0118050abee263f3a14/62fe0/nguyen.webp 150w,\n/static/5e71ca9a49d0d0118050abee263f3a14/31149/nguyen.webp 160w","sizes":"(max-width: 100px) 100vw, 100px","presentationWidth":100,"presentationHeight":100}}}},"html":"<p>Cyber Common Operating Picture (CCOP) comprises security metrics that reflect the cyber-health of an organization with respect to its historical performance and the industry standard. These metrics are generated from various sources of security intelligence, such as reports from security tools (e.g., SIEM, IDS, firewalls) as well as external intelligence sources (e.g, Open-source intelligence, vulnerability registries). Each organization has different level of access to these sources. Moreover, they have different requirements in terms of the metrics to be included in the CCOP and the relative importance of these metrics.</p>\n<p>Given the large number of metrics that can be used for CCOP, it is difficult for organizations to map their current capabilities, in terms of the security intelligence sources that they have, to the metrics. Moreover, the requirements of an organization might simply be insatisfiable given their existing capability. Thus, the organization needs recommendations on either extending their capability or modifying their requirements. A CCOP-specific recommendation system that can solve this problem does not exist.</p>\n<p>This research activity aims at applying Artificial Intelligence (AI) techniques, such as semantic reasoning and collaborative filtering, to develop a recommendation mechanism that matches organizations with the right metrics in the CCOP model and provides suggestions about extending capabilities or modifying requirements.</p>\n<h2>Aims and Expected Outcomes</h2>\n<p>The key outcomes of will be:</p>\n<ol>\n<li>An AI-enabled prototype tool for providing organizational specific security metrics recommendation services that would become part of the CCOP platform</li>\n</ol>\n<h2>Team Members</h2>\n<ul>\n<li>Anupam .</li>\n<li>Nguyen Khoi Tran</li>\n</ul>"}},"pageContext":{"slug":"metrics-recommendation-for-cyber-common-operating-picture","next":{"frontmatter":{"title":"AI Assistant for Cyber Common Operating Picture","featured_image":null},"fields":{"slug":"ai-assistant-for-cyber-common-operating-picture"}},"previous":{"frontmatter":{"title":"Collaborative Cyber Common Operating Picture","featured_image":null},"fields":{"slug":"collaborative-cyber-common-operating-picture"}},"breadcrumb":{"location":"/metrics-recommendation-for-cyber-common-operating-picture","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/metrics-recommendation-for-cyber-common-operating-picture","crumbLabel":"metrics-recommendation-for-cyber-common-operating-picture"}]}}}}