首页 > 最新文献

2019 IEEE Symposium on Visualization for Cyber Security (VizSec)最新文献

英文 中文
VizSec 2019 Table of Contents VizSec 2019目录表
Pub Date : 2019-10-01 DOI: 10.1109/vizsec48167.2019.9161558
{"title":"VizSec 2019 Table of Contents","authors":"","doi":"10.1109/vizsec48167.2019.9161558","DOIUrl":"https://doi.org/10.1109/vizsec48167.2019.9161558","url":null,"abstract":"","PeriodicalId":242942,"journal":{"name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study 多层次夺旗游戏玩家的视觉反馈:实地可用性研究
Pub Date : 2019-10-01 DOI: 10.1109/VIZSEC48167.2019.9161386
R. Ošlejšek, Vít Rusňák, K. Burská, Valdemar Švábenský, Jan Vykopal
Capture the Flag games represent a popular method of cybersecurity training. Providing meaningful insight into the training progress is essential for increasing learning impact and supporting participants’ motivation, especially in advanced hands-on courses. In this paper, we investigate how to provide valuable post-game feedback to players of serious cybersecurity games through interactive visualizations. In collaboration with domain experts, we formulated user requirements that cover three cognitive perspectives: gameplay overview, person-centric view, and comparative feedback. Based on these requirements, we designed two interactive visualizations that provide complementary views on game results. They combine a known clustering and time-based visual approaches to show game results in a way that is easy to decode for players. The purposefulness of our visual feedback was evaluated in a usability field study with attendees of the Summer School in Cyber Security. The evaluation confirmed the adequacy of the two visualizations for instant post-game feedback. Despite our initial expectations, there was no strong preference for neither of the visualizations in solving different tasks.
夺旗游戏代表了一种流行的网络安全培训方法。对培训进度提供有意义的洞察对于提高学习效果和支持参与者的动机至关重要,特别是在高级实践课程中。在本文中,我们研究了如何通过交互式可视化为严肃网络安全游戏的玩家提供有价值的赛后反馈。在与领域专家的合作下,我们制定了涵盖三个认知视角的用户需求:游戏玩法概述、以人为中心的观点和比较反馈。基于这些需求,我们设计了两种互动式视觉效果,为游戏结果提供互补的视角。它们结合了已知的聚类和基于时间的视觉方法,以一种易于玩家理解的方式呈现游戏结果。我们的视觉反馈的目的性在网络安全暑期学校的参与者的可用性实地研究中得到了评估。评估确认了这两种视觉效果的充分性,可以提供即时的赛后反馈。与我们最初的期望不同,在解决不同的任务时,我们对这两种可视化方法都没有强烈的偏好。
{"title":"Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study","authors":"R. Ošlejšek, Vít Rusňák, K. Burská, Valdemar Švábenský, Jan Vykopal","doi":"10.1109/VIZSEC48167.2019.9161386","DOIUrl":"https://doi.org/10.1109/VIZSEC48167.2019.9161386","url":null,"abstract":"Capture the Flag games represent a popular method of cybersecurity training. Providing meaningful insight into the training progress is essential for increasing learning impact and supporting participants’ motivation, especially in advanced hands-on courses. In this paper, we investigate how to provide valuable post-game feedback to players of serious cybersecurity games through interactive visualizations. In collaboration with domain experts, we formulated user requirements that cover three cognitive perspectives: gameplay overview, person-centric view, and comparative feedback. Based on these requirements, we designed two interactive visualizations that provide complementary views on game results. They combine a known clustering and time-based visual approaches to show game results in a way that is easy to decode for players. The purposefulness of our visual feedback was evaluated in a usability field study with attendees of the Summer School in Cyber Security. The evaluation confirmed the adequacy of the two visualizations for instant post-game feedback. Despite our initial expectations, there was no strong preference for neither of the visualizations in solving different tasks.","PeriodicalId":242942,"journal":{"name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125257113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
VizSec 2019 Foreword
Pub Date : 2019-10-01 DOI: 10.1109/vizsec48167.2019.9161672
{"title":"VizSec 2019 Foreword","authors":"","doi":"10.1109/vizsec48167.2019.9161672","DOIUrl":"https://doi.org/10.1109/vizsec48167.2019.9161672","url":null,"abstract":"","PeriodicalId":242942,"journal":{"name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Labeling Network Hostile Behavior with Intelligent Interactive Tools 基于智能交互工具的网络敌对行为标注研究
Pub Date : 2019-10-01 DOI: 10.1109/VizSec48167.2019.9161489
Jorge Guerra, Eduardo E. Veas, C. Catania
Labeling a real network dataset is specially expensive in computer security, as an expert has to ponder several factors before assigning each label. This paper describes an interactive intelligent system to support the task of identifying hostile behaviors in network logs. The RiskID application uses visualizations to graphically encode features of network connections and promote visual comparison. In the background, two algorithms are used to actively organize connections and predict potential labels: a recommendation algorithm and a semi-supervised learning strategy. These algorithms together with interactive adaptions to the user interface constitute a behavior recommendation. A study is carried out to analyze how the algorithms for recommendation and prediction influence the workflow of labeling a dataset. The results of a study with 16 participants indicate that the behaviour recommendation significantly improves the quality of labels. Analyzing interaction patterns, we identify a more intuitive workflow used when behaviour recommendation is available.
标记真实的网络数据集在计算机安全方面特别昂贵,因为专家在分配每个标签之前必须考虑几个因素。本文描述了一种交互式智能系统来支持识别网络日志中的敌对行为。RiskID应用程序使用可视化来图形化地编码网络连接的特征,并促进可视化比较。在后台,使用两种算法来主动组织连接并预测潜在的标签:推荐算法和半监督学习策略。这些算法与对用户界面的交互式适应一起构成了行为推荐。研究了推荐和预测算法对数据集标注工作流程的影响。一项有16名参与者的研究结果表明,行为推荐显著提高了标签的质量。通过分析交互模式,我们确定了当行为推荐可用时使用的更直观的工作流。
{"title":"A Study on Labeling Network Hostile Behavior with Intelligent Interactive Tools","authors":"Jorge Guerra, Eduardo E. Veas, C. Catania","doi":"10.1109/VizSec48167.2019.9161489","DOIUrl":"https://doi.org/10.1109/VizSec48167.2019.9161489","url":null,"abstract":"Labeling a real network dataset is specially expensive in computer security, as an expert has to ponder several factors before assigning each label. This paper describes an interactive intelligent system to support the task of identifying hostile behaviors in network logs. The RiskID application uses visualizations to graphically encode features of network connections and promote visual comparison. In the background, two algorithms are used to actively organize connections and predict potential labels: a recommendation algorithm and a semi-supervised learning strategy. These algorithms together with interactive adaptions to the user interface constitute a behavior recommendation. A study is carried out to analyze how the algorithms for recommendation and prediction influence the workflow of labeling a dataset. The results of a study with 16 participants indicate that the behaviour recommendation significantly improves the quality of labels. Analyzing interaction patterns, we identify a more intuitive workflow used when behaviour recommendation is available.","PeriodicalId":242942,"journal":{"name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117055212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Guess Me If You Can: A Visual Uncertainty Model for Transparent Evaluation of Disclosure Risks in Privacy-Preserving Data Visualization “猜猜我”:隐私保护数据可视化中披露风险透明评估的视觉不确定性模型
Pub Date : 2019-10-01 DOI: 10.1109/VizSec48167.2019.9161608
Aritra Dasgupta, Robert Kosara, Min Chen
Minimization of disclosure risks is a key challenge in publicly available visualizations that can potentially reveal personal information. Such risks are inherently dependent on the amount of information that adversaries can gain by manipulating visual representations and by using their background knowledge. Conventional risk quantification models proposed in the field of privacy-preserving data mining suffer from a lack of transparency in letting data owners control privacy parameters and understand their implications for disclosure risks. To fill this gap, we propose a visual uncertainty model for letting data owners understand the relationships between privacy parameters and vulnerable visualization configurations. Our main contribution is a probabilistic analysis of the disclosure risks associated with vulnerabilities in privacy-preserving parallel coordinates and scatter plots. We quantify the relationship among attack scenarios, adversarial knowledge, and the inherent uncertainty in cluster-based visualizations that can act as defense mechanisms. We present examples and a case study to demonstrate the effectiveness of the model.
在可能泄露个人信息的公开可视化中,最大限度地降低披露风险是一项关键挑战。这种风险本质上依赖于攻击者通过操纵视觉表示和利用他们的背景知识所获得的信息量。在保护隐私的数据挖掘领域中提出的传统风险量化模型在让数据所有者控制隐私参数并了解其对披露风险的影响方面缺乏透明度。为了填补这一空白,我们提出了一个可视化不确定性模型,让数据所有者了解隐私参数和易受攻击的可视化配置之间的关系。我们的主要贡献是对隐私保护平行坐标和散点图中与漏洞相关的披露风险进行概率分析。我们量化了攻击场景、对抗性知识和基于集群的可视化中可以作为防御机制的固有不确定性之间的关系。我们通过实例和案例研究来证明该模型的有效性。
{"title":"Guess Me If You Can: A Visual Uncertainty Model for Transparent Evaluation of Disclosure Risks in Privacy-Preserving Data Visualization","authors":"Aritra Dasgupta, Robert Kosara, Min Chen","doi":"10.1109/VizSec48167.2019.9161608","DOIUrl":"https://doi.org/10.1109/VizSec48167.2019.9161608","url":null,"abstract":"Minimization of disclosure risks is a key challenge in publicly available visualizations that can potentially reveal personal information. Such risks are inherently dependent on the amount of information that adversaries can gain by manipulating visual representations and by using their background knowledge. Conventional risk quantification models proposed in the field of privacy-preserving data mining suffer from a lack of transparency in letting data owners control privacy parameters and understand their implications for disclosure risks. To fill this gap, we propose a visual uncertainty model for letting data owners understand the relationships between privacy parameters and vulnerable visualization configurations. Our main contribution is a probabilistic analysis of the disclosure risks associated with vulnerabilities in privacy-preserving parallel coordinates and scatter plots. We quantify the relationship among attack scenarios, adversarial knowledge, and the inherent uncertainty in cluster-based visualizations that can act as defense mechanisms. We present examples and a case study to demonstrate the effectiveness of the model.","PeriodicalId":242942,"journal":{"name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Visual Analytics Framework for Adversarial Text Generation 对抗性文本生成的可视化分析框架
Pub Date : 2019-09-24 DOI: 10.1109/VizSec48167.2019.9161563
Brandon Laughlin, C. Collins, K. Sankaranarayanan, K. El-Khatib
This paper presents a framework which enables a user to more easily make corrections to adversarial texts. While attack algorithms have been demonstrated to automatically build adversaries, changes made by the algorithms can often have poor semantics or syntax. Our framework is designed to facilitate human intervention by aiding users in making corrections. The framework extends existing attack algorithms to work within an evolutionary attack process paired with a visual analytics loop. Using an interactive dashboard a user is able to review the generation process in real time and receive suggestions from the system for edits to be made. The adversaries can be used to both diagnose robustness issues within a single classifier or to compare various classifier options. With the weaknesses identified, the framework can also be used as a first step in mitigating adversarial threats. The framework can be used as part of further research into defense methods in which the adversarial examples are used to evaluate new countermeasures. We demonstrate the framework with a word swapping attack for the task of sentiment classification.
本文提出了一个框架,使用户能够更容易地纠正对抗性文本。虽然攻击算法已被证明可以自动构建对手,但算法所做的更改通常具有较差的语义或语法。我们的框架旨在通过帮助用户纠正错误来促进人为干预。该框架扩展了现有的攻击算法,使其在与可视化分析循环配对的进化攻击过程中工作。使用交互式仪表板,用户能够实时查看生成过程,并从系统接收要进行编辑的建议。对手可以用来诊断单个分类器中的鲁棒性问题,也可以用来比较不同的分类器选项。在确定了弱点之后,该框架也可以作为减轻对抗性威胁的第一步。该框架可作为进一步研究防御方法的一部分,其中使用对抗性示例来评估新的对策。我们用一个词交换攻击来演示该框架的情感分类任务。
{"title":"A Visual Analytics Framework for Adversarial Text Generation","authors":"Brandon Laughlin, C. Collins, K. Sankaranarayanan, K. El-Khatib","doi":"10.1109/VizSec48167.2019.9161563","DOIUrl":"https://doi.org/10.1109/VizSec48167.2019.9161563","url":null,"abstract":"This paper presents a framework which enables a user to more easily make corrections to adversarial texts. While attack algorithms have been demonstrated to automatically build adversaries, changes made by the algorithms can often have poor semantics or syntax. Our framework is designed to facilitate human intervention by aiding users in making corrections. The framework extends existing attack algorithms to work within an evolutionary attack process paired with a visual analytics loop. Using an interactive dashboard a user is able to review the generation process in real time and receive suggestions from the system for edits to be made. The adversaries can be used to both diagnose robustness issues within a single classifier or to compare various classifier options. With the weaknesses identified, the framework can also be used as a first step in mitigating adversarial threats. The framework can be used as part of further research into defense methods in which the adversarial examples are used to evaluate new countermeasures. We demonstrate the framework with a word swapping attack for the task of sentiment classification.","PeriodicalId":242942,"journal":{"name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"975 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116214628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2019 IEEE Symposium on Visualization for Cyber Security (VizSec)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1