DocumentCode :
665605
Title :
CyberVis: Visualizing the potential impact of cyber attacks on the wider enterprise
Author :
Creese, Sadie ; Goldsmith, Michael ; Moffat, Nick ; Happa, Jassim ; Agrafiotis, Ioannis
Author_Institution :
Dept. of Comput. Sci., Univ. of Oxford, Oxford, UK
fYear :
2013
fDate :
12-14 Nov. 2013
Firstpage :
73
Lastpage :
79
Abstract :
A variety of data-mining tools and filtering techniques exist to detect and analyze cyber-attacks by monitoring network traffic. In recent years many of these tools use visualization designed to make traffic patterns and impact of an attack tangible to a security analyst. The visualizations attempt to facilitate understanding elements of an attack, including the location of malicious activity on a network and the consequences for the wider system. The human observer is able to detect patterns from useful visualizations, and so discover new knowledge about existing data sets. Because of human reasoning, such approaches still have an advantage over automated detection, data-mining and analysis. The core challenge still lies in using the appropriate visualization at the right time. It is this lack of situational awareness that our CyberVis framework is designed to address. In this paper we present a novel approach to the visualization of enterprise network attacks and their subsequent potential consequences. We achieve this by combining traditional network diagram icons with Business Process Modeling and Notation (BPMN), a risk-propagation logic that connects the network and business-process and task layer, and a flexible alert input schema able to support intrusion alerts from any third-party sensor. Rather than overwhelming a user with excessive amounts of information, CyberVis abstracts the visuals to show only noteworthy information about attack data and indicates potential impact both across the network and on enterprise tasks. CyberVis is designed with the Human Visual System (HVS) in mind, so severe attacks (or many smaller attacks that make up a large risk) appear more salient than other components in the scene. A Deep-Dive window allows for investigation of data, similar to a database interface. Finally, a Forensic Mode allows movie-style playback of past alerts under user-defined conditions for closer examination.
Keywords :
business data processing; data analysis; data mining; data visualisation; security of data; BPMN; CyberVis framework; attack elements; business process modeling and notation; cyber attacks; data analysis; data mining tools; database interface; deep-dive window; enterprise network attacks; filtering techniques; forensic mode; human visual system; malicious activity; network traffic; risk propagation logic; user-defined conditions; visualization; Business; Forensics; Image color analysis; Monitoring; Security; Three-dimensional displays; Visualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Technologies for Homeland Security (HST), 2013 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4799-3963-3
Type :
conf
DOI :
10.1109/THS.2013.6698979
Filename :
6698979
Link To Document :
بازگشت