Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

Georgios Bakirtzis, B. Simon, C. Fleming, C. Elks
{"title":"Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis","authors":"Georgios Bakirtzis, B. Simon, C. Fleming, C. Elks","doi":"10.1109/VIZSEC.2018.8709187","DOIUrl":null,"url":null,"abstract":"Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking tools that employ effective dashboards—to manage potential attack vectors, system components, and requirements. This problem is further exacerbated because model-based security analysis produces significantly larger result spaces than security analysis applied to realized systems—where platform specific information, software versions, and system element dependencies are known. Therefore, there is a need to manage the analysis complexity in model-based security through better visualization techniques. Towards that goal, we propose an interactive security analysis dashboard that provides different views largely centered around the system, its requirements, and its associated attack vector space. This tool makes it possible to start analysis earlier in the system lifecycle. We apply this tool in a significant area of engineering design—the design of cyber-physical systems—where security violations can lead to safety hazards.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VIZSEC.2018.8709187","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking tools that employ effective dashboards—to manage potential attack vectors, system components, and requirements. This problem is further exacerbated because model-based security analysis produces significantly larger result spaces than security analysis applied to realized systems—where platform specific information, software versions, and system element dependencies are known. Therefore, there is a need to manage the analysis complexity in model-based security through better visualization techniques. Towards that goal, we propose an interactive security analysis dashboard that provides different views largely centered around the system, its requirements, and its associated attack vector space. This tool makes it possible to start analysis earlier in the system lifecycle. We apply this tool in a significant area of engineering design—the design of cyber-physical systems—where security violations can lead to safety hazards.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在暗室中寻找黑猫:网络物理系统设计与分析的安全可视化
今天,有大量的软件安全工具使用可视化技术来创建有用且有效的交互式安全分析仪表板。这样的仪表板可以帮助分析师了解手头的数据,从而构思出更有针对性的抢占和缓解安全策略。尽管最近取得了进展,但是基于模型的安全分析仍然缺乏使用有效指示板的工具来管理潜在的攻击向量、系统组件和需求。由于基于模型的安全性分析产生的结果空间比应用于已实现系统的安全性分析产生的结果空间大得多(在已实现系统中,平台特定信息、软件版本和系统元素依赖关系是已知的),因此这个问题进一步恶化。因此,有必要通过更好的可视化技术来管理基于模型的安全性中的分析复杂性。为了实现这一目标,我们提出了一个交互式安全分析仪表板,它提供了主要围绕系统、其需求及其相关攻击向量空间的不同视图。这个工具使得在系统生命周期的早期开始分析成为可能。我们将此工具应用于工程设计的重要领域-网络物理系统的设计-其中违反安全规定可能导致安全隐患。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Visual Analytics for Root DNS Data TAPESTRY: Visualizing Interwoven Identities for Trust Provenance Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data ROPMate: Visually Assisting the Creation of ROP-based Exploits User Behavior Map: Visual Exploration for Cyber Security Session Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1