首页 > 最新文献

2018 IEEE Symposium on Visualization for Cyber Security (VizSec)最新文献

英文 中文
TAPESTRY: Visualizing Interwoven Identities for Trust Provenance 挂毯:可视化相互交织的身份信任来源
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709236
Yifan Yang, J. Collomosse, A. Manohar, J. Briggs, J. Steane
In this paper we report our study involving an early prototype of TAPESTRY, a service to support people and businesses to connect safely online through the use of a Machine Learning generated visualization. Establishing the veracity of the person or business behind a pseudonomized identity, online, is a challenge for many people. In the burgeoning digital economy, finding ways to support good decision-making in potentially risky online exchanges is of vital importance. In this paper, we propose a Machine Learning method to extract temporal patterns from data on individuals’ behavioral norms in their online activity. This monitors and communicates the coherence of these activities to others, especially those who are about to disclose personal information to the individual, in a visualization. We report findings from a user trial that examined how people accessed and interpreted the TAPESTRY visualization to inform their decisions on who to back in a mock crowdfunding campaign to evaluate its efficacy. The study proved the protocol of the Machine Learning method and qualitative insights are informing iterations of the visualization design to enhance user experience and support understanding.
在本文中,我们报告了我们的研究涉及TAPESTRY的早期原型,TAPESTRY是一种通过使用机器学习生成的可视化来支持人们和企业安全在线连接的服务。对许多人来说,在网上建立一个假名身份背后的个人或企业的真实性是一个挑战。在蓬勃发展的数字经济中,在潜在风险的在线交易中找到支持良好决策的方法至关重要。在本文中,我们提出了一种机器学习方法,从个人在线活动中的行为规范数据中提取时间模式。它以可视化的方式监控并将这些活动的连贯性传达给其他人,特别是那些即将向个人披露个人信息的人。我们报告了一项用户试验的结果,该试验检查了人们如何访问和解释TAPESTRY可视化,以告知他们在模拟众筹活动中支持谁的决定,以评估其功效。该研究证明了机器学习方法的协议和定性见解为可视化设计的迭代提供了信息,以增强用户体验并支持理解。
{"title":"TAPESTRY: Visualizing Interwoven Identities for Trust Provenance","authors":"Yifan Yang, J. Collomosse, A. Manohar, J. Briggs, J. Steane","doi":"10.1109/VIZSEC.2018.8709236","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709236","url":null,"abstract":"In this paper we report our study involving an early prototype of TAPESTRY, a service to support people and businesses to connect safely online through the use of a Machine Learning generated visualization. Establishing the veracity of the person or business behind a pseudonomized identity, online, is a challenge for many people. In the burgeoning digital economy, finding ways to support good decision-making in potentially risky online exchanges is of vital importance. In this paper, we propose a Machine Learning method to extract temporal patterns from data on individuals’ behavioral norms in their online activity. This monitors and communicates the coherence of these activities to others, especially those who are about to disclose personal information to the individual, in a visualization. We report findings from a user trial that examined how people accessed and interpreted the TAPESTRY visualization to inform their decisions on who to back in a mock crowdfunding campaign to evaluate its efficacy. The study proved the protocol of the Machine Learning method and qualitative insights are informing iterations of the visualization design to enhance user experience and support understanding.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115369574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOC 根据SOC的输入,建立SOC的机器学习模型,并对其进行分析
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709231
Awalin Sopan, Matthew Berninger, Murali Mulakaluri, Raj Katakam
This work demonstrates an ongoing effort to employ and explain machine learning model predictions for classifying alerts in Security Operations Centers (SOC). Our ultimate goal is to reduce analyst workload by automating the process of decision making for investigating alerts using the machine learning model in cases where we can completely trust the model. This way, SOC analysts will be able to focus their time and effort to investigate more complex cases of security alerts. To achieve this goal, we developed a system that shows the prediction for an alert and the prediction explanation to security analysts during their daily workflow of investigating individual security alerts. Another part of our system presents the aggregated model analytics to the managers and stakeholders to help them understand the model and decide, on when to trust the model and let the model make the final decision. Using our prediction explanation visualization, security analysts will be able to classify oncoming alerts more efficiently and gain insight into how a machine learning model generates predictions. Our model performance analysis dashboard helps decision makers analyze the model in signature level granularity and gain more insights about the model.
这项工作展示了在安全运营中心(SOC)中使用和解释机器学习模型预测分类警报的持续努力。我们的最终目标是在我们可以完全信任机器学习模型的情况下,通过使用机器学习模型自动化调查警报的决策过程来减少分析师的工作量。通过这种方式,SOC分析师将能够集中时间和精力来调查更复杂的安全警报案例。为了实现这一目标,我们开发了一个系统,该系统可以在安全分析师调查单个安全警报的日常工作流程中向他们显示警报的预测和预测解释。系统的另一部分向管理人员和涉众提供聚合模型分析,以帮助他们理解模型并决定何时信任模型并让模型做出最终决定。使用我们的预测解释可视化,安全分析师将能够更有效地对迎面而来的警报进行分类,并深入了解机器学习模型如何生成预测。我们的模型性能分析仪表板可以帮助决策者在签名级粒度上分析模型,并获得关于模型的更多见解。
{"title":"Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOC","authors":"Awalin Sopan, Matthew Berninger, Murali Mulakaluri, Raj Katakam","doi":"10.1109/VIZSEC.2018.8709231","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709231","url":null,"abstract":"This work demonstrates an ongoing effort to employ and explain machine learning model predictions for classifying alerts in Security Operations Centers (SOC). Our ultimate goal is to reduce analyst workload by automating the process of decision making for investigating alerts using the machine learning model in cases where we can completely trust the model. This way, SOC analysts will be able to focus their time and effort to investigate more complex cases of security alerts. To achieve this goal, we developed a system that shows the prediction for an alert and the prediction explanation to security analysts during their daily workflow of investigating individual security alerts. Another part of our system presents the aggregated model analytics to the managers and stakeholders to help them understand the model and decide, on when to trust the model and let the model make the final decision. Using our prediction explanation visualization, security analysts will be able to classify oncoming alerts more efficiently and gain insight into how a machine learning model generates predictions. Our model performance analysis dashboard helps decision makers analyze the model in signature level granularity and gain more insights about the model.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127868932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Empirical Study on Perceptually Masking Privacy in Graph Visualizations 图可视化中感知掩盖隐私的实证研究
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709181
Jia-Kai Chou, Chris Bryan, Jing Li, K. Ma
Researchers such as sociologists create visualizations of multivariate node-link diagrams to present findings about the relationships in communities. Unfortunately, such visualizations can inadvertently expose the ostensibly private identities of the persons that make up the dataset. By purposely violating graph readability metrics for a small region of the graph, we conjecture that local, exposed privacy leaks may be perceptually masked from easy recognition. In particular, we consider three commonly known metrics—edge crossing, node clustering, and node-edge overlapping—as a strategy to hide leaks. We evaluate the effectiveness of violating these metrics by conducting a user study that measures subject performance at visually searching for and identifying a privacy leak. Results show that when more masking operations are applied, participants needed more time to locate the privacy leak, though exhaustive, brute force search can eventually find it. We suggest future directions on how perceptual masking can be a viable strategy, primarily where modifying the underlying network structure is unfeasible.
社会学家等研究人员创建了多变量节点链接图的可视化,以呈现有关社区关系的发现。不幸的是,这种可视化可能会无意中暴露组成数据集的人员表面上的隐私身份。通过故意违反图的一小部分区域的图可读性指标,我们推测局部暴露的隐私泄漏可能在感知上被掩盖,不容易被识别。特别是,我们考虑了三种常见的度量——边缘交叉、节点聚类和节点边缘重叠——作为隐藏泄漏的策略。我们通过进行一项用户研究来评估违反这些指标的有效性,该研究测量了受试者在视觉搜索和识别隐私泄漏方面的表现。结果表明,当应用更多的屏蔽操作时,参与者需要更多的时间来定位隐私泄漏,尽管穷举,蛮力搜索最终可以找到它。我们建议未来的方向是感知掩蔽如何成为一种可行的策略,主要是在修改底层网络结构不可行的情况下。
{"title":"An Empirical Study on Perceptually Masking Privacy in Graph Visualizations","authors":"Jia-Kai Chou, Chris Bryan, Jing Li, K. Ma","doi":"10.1109/VIZSEC.2018.8709181","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709181","url":null,"abstract":"Researchers such as sociologists create visualizations of multivariate node-link diagrams to present findings about the relationships in communities. Unfortunately, such visualizations can inadvertently expose the ostensibly private identities of the persons that make up the dataset. By purposely violating graph readability metrics for a small region of the graph, we conjecture that local, exposed privacy leaks may be perceptually masked from easy recognition. In particular, we consider three commonly known metrics—edge crossing, node clustering, and node-edge overlapping—as a strategy to hide leaks. We evaluate the effectiveness of violating these metrics by conducting a user study that measures subject performance at visually searching for and identifying a privacy leak. Results show that when more masking operations are applied, participants needed more time to locate the privacy leak, though exhaustive, brute force search can eventually find it. We suggest future directions on how perceptual masking can be a viable strategy, primarily where modifying the underlying network structure is unfeasible.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ROPMate: Visually Assisting the Creation of ROP-based Exploits ROPMate:可视化地帮助创建基于rop的漏洞
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709204
M. Angelini, G. Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, S. Lenti, G. Santucci
Exploits based on ROP (Return-Oriented Programming) are increasingly present in advanced attack scenarios. Testing systems for ROP-based attacks can be valuable for improving the security and reliability of software. In this paper, we propose ROPMATE, the first Visual Analytics system specifically designed to assist human red team ROP exploit builders. In contrast, previous ROP tools typically require users to inspect a puzzle of hundreds or thousands of lines of textual information, making it a daunting task. ROPMATE presents builders with a clear interface of well-defined and semantically meaningful gadgets, i.e., fragments of code already present in the binary application that can be chained to form fully-functional exploits. The system supports incrementally building exploits by suggesting gadget candidates filtered according to constraints on preserved registers and accessed memory. Several visual aids are offered to identify suitable gadgets and assemble them into semantically correct chains. We report on a preliminary user study that shows how ROPMATE can assist users in building ROP chains.
基于ROP (Return-Oriented Programming)的漏洞利用越来越多地出现在高级攻击场景中。针对基于rop的攻击测试系统对于提高软件的安全性和可靠性非常有价值。在本文中,我们提出了ROPMATE,这是第一个专门用于帮助人类红队ROP漏洞构建者的可视化分析系统。相比之下,以前的ROP工具通常需要用户检查数百或数千行文本信息的谜题,这使其成为一项艰巨的任务。ROPMATE为构建者提供了一个清晰的接口,其中包含定义良好且语义有意义的小工具,即已经存在于二进制应用程序中的代码片段,可以被链接以形成功能齐全的漏洞。系统通过建议根据保留寄存器和访问内存的约束筛选的小工具候选项来支持增量构建漏洞。提供了几种视觉辅助工具来识别合适的小工具并将它们组装成语义正确的链。我们报告了一项初步的用户研究,显示了ROPMATE如何帮助用户构建ROP链。
{"title":"ROPMate: Visually Assisting the Creation of ROP-based Exploits","authors":"M. Angelini, G. Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, S. Lenti, G. Santucci","doi":"10.1109/VIZSEC.2018.8709204","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709204","url":null,"abstract":"Exploits based on ROP (Return-Oriented Programming) are increasingly present in advanced attack scenarios. Testing systems for ROP-based attacks can be valuable for improving the security and reliability of software. In this paper, we propose ROPMATE, the first Visual Analytics system specifically designed to assist human red team ROP exploit builders. In contrast, previous ROP tools typically require users to inspect a puzzle of hundreds or thousands of lines of textual information, making it a daunting task. ROPMATE presents builders with a clear interface of well-defined and semantically meaningful gadgets, i.e., fragments of code already present in the binary application that can be chained to form fully-functional exploits. The system supports incrementally building exploits by suggesting gadget candidates filtered according to constraints on preserved registers and accessed memory. Several visual aids are offered to identify suitable gadgets and assemble them into semantically correct chains. We report on a preliminary user study that shows how ROPMATE can assist users in building ROP chains.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123090937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Crush Your Data with ViC2ES Then CHISSL Away 用ViC2ES碾碎你的数据,然后离开
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709212
Dustin L. Arendt, Lyndsey R. Franklin, Fumeng Yang, Brooke R. Brisbois, Ryan R. LaMothe
Insider Threat Detection is one of the greatest challenges for organizational cybersecurity [2]. In this paper, we designed and evaluated visually compressed cyber event sequence (ViC2ES) to assist analysts with building mental models about user activity for Insider Threat Detection. Our visualizations, which show user activity on a daily level, are purpose-built to be embedded in our in-house active learning tool called "CHISSL." [3], [4] We explored different visual compression techniques with binning or run length encoding, resulting in four unique designs built upon the same icon array presentation. We evaluated these four designs for both low-level and high-level tasks in two experiments: in Experiment I, participants performed perceptual tasks such as selecting the most and least similar activities for each of the designs; in Experiment II, participants used one of the designs in CHISSL for eleven reasoning tasks. The results suggest that participants preferred the high level of aggregation, but made the fewest errors with the low level of aggregation; they were able to interact with CHISSL and accomplish the tasks using both designs. We believe our aggregated designs are effective regarding both task performance and screen space; the high and low levels of aggregation designs are valid for user activity modeling.
内部威胁检测是组织网络安全面临的最大挑战之一[2]。在本文中,我们设计并评估了视觉压缩的网络事件序列(ViC2ES),以帮助分析人员建立关于内部威胁检测的用户活动的心理模型。我们的可视化显示了用户每天的活动,这是专门为嵌入我们内部的主动学习工具“CHISSL”而设计的。[3],[4]我们探索了不同的视觉压缩技术,包括分组或运行长度编码,从而产生了基于相同图标数组呈现的四种独特设计。我们在两个实验中对这四种设计进行了低级和高级任务的评估:在实验一中,参与者执行感知任务,如为每个设计选择最相似和最不相似的活动;在实验二中,参与者使用CHISSL中的一种设计完成了11个推理任务。结果表明:被试倾向于高聚合水平,但在低聚合水平下犯的错误最少;他们能够与CHISSL互动,并使用两种设计完成任务。我们相信我们的聚合设计在任务性能和屏幕空间方面都是有效的;高层次和低层次的聚合设计对于用户活动建模是有效的。
{"title":"Crush Your Data with ViC2ES Then CHISSL Away","authors":"Dustin L. Arendt, Lyndsey R. Franklin, Fumeng Yang, Brooke R. Brisbois, Ryan R. LaMothe","doi":"10.1109/VIZSEC.2018.8709212","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709212","url":null,"abstract":"Insider Threat Detection is one of the greatest challenges for organizational cybersecurity [2]. In this paper, we designed and evaluated visually compressed cyber event sequence (ViC2ES) to assist analysts with building mental models about user activity for Insider Threat Detection. Our visualizations, which show user activity on a daily level, are purpose-built to be embedded in our in-house active learning tool called \"CHISSL.\" [3], [4] We explored different visual compression techniques with binning or run length encoding, resulting in four unique designs built upon the same icon array presentation. We evaluated these four designs for both low-level and high-level tasks in two experiments: in Experiment I, participants performed perceptual tasks such as selecting the most and least similar activities for each of the designs; in Experiment II, participants used one of the designs in CHISSL for eleven reasoning tasks. The results suggest that participants preferred the high level of aggregation, but made the fewest errors with the low level of aggregation; they were able to interact with CHISSL and accomplish the tasks using both designs. We believe our aggregated designs are effective regarding both task performance and screen space; the high and low levels of aggregation designs are valid for user activity modeling.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131170717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Visual Analytics for Root DNS Data 根DNS数据可视化分析
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709205
Eric Krokos, Alexander Rowden, K. Whitley, A. Varshney
The analysis of vast amounts of network data for monitoring and safeguarding a core pillar of the internet, the root DNS, is an enormous challenge. Understanding the distribution of the queries received by the root DNS, and how those queries change over time, in an intuitive manner is sought. Traditional query analysis is performed packet by packet, lacking global, temporal, and visual coherence, obscuring latent trends and clusters. Our approach leverages the pattern recognition and computational power of deep learning with 2D and 3D rendering techniques for quick and easy interpretation and interaction with vast amount of root DNS network traffic. Working with real-world DNS experts, our visualization reveals several surprising latent clusters of queries, potentially malicious and benign, discovers previously unknown characteristics of a real-world root DNS DDOS attack, and uncovers unforeseen changes in the distribution of queries received over time. These discoveries will provide DNS analysts with a deeper understanding of the nature of the DNS traffic under their charge, which will help them safeguard the root DNS against future attack.
分析大量网络数据以监控和保护互联网的核心支柱——根DNS,是一项巨大的挑战。以直观的方式了解根DNS接收的查询的分布,以及这些查询如何随时间变化。传统的查询分析是逐包执行的,缺乏全局、时间和视觉一致性,模糊了潜在的趋势和聚类。我们的方法利用2D和3D渲染技术的模式识别和深度学习的计算能力,快速轻松地解释和与大量根DNS网络流量交互。与现实世界的DNS专家合作,我们的可视化揭示了几个令人惊讶的潜在查询集群,可能是恶意的和良性的,发现了现实世界根DNS DDOS攻击以前未知的特征,并揭示了随着时间的推移,收到的查询分布中不可预见的变化。这些发现将使DNS分析人员更深入地了解其负责的DNS流量的性质,这将有助于他们保护根DNS免受未来的攻击。
{"title":"Visual Analytics for Root DNS Data","authors":"Eric Krokos, Alexander Rowden, K. Whitley, A. Varshney","doi":"10.1109/VIZSEC.2018.8709205","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709205","url":null,"abstract":"The analysis of vast amounts of network data for monitoring and safeguarding a core pillar of the internet, the root DNS, is an enormous challenge. Understanding the distribution of the queries received by the root DNS, and how those queries change over time, in an intuitive manner is sought. Traditional query analysis is performed packet by packet, lacking global, temporal, and visual coherence, obscuring latent trends and clusters. Our approach leverages the pattern recognition and computational power of deep learning with 2D and 3D rendering techniques for quick and easy interpretation and interaction with vast amount of root DNS network traffic. Working with real-world DNS experts, our visualization reveals several surprising latent clusters of queries, potentially malicious and benign, discovers previously unknown characteristics of a real-world root DNS DDOS attack, and uncovers unforeseen changes in the distribution of queries received over time. These discoveries will provide DNS analysts with a deeper understanding of the nature of the DNS traffic under their charge, which will help them safeguard the root DNS against future attack.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114743233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data 利用地理ip数据进行异常ip块行为的可视化交互识别
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709182
Alex Ulmer, Marija Schufrin, D. Sessler, J. Kohlhammer
Routing of network packets from one computer to another is the backbone of the internet and impacts the everyday life of many people. Although, this is a fully automated process it has many security issues. IP hijacks and misconfigurations occur very often and are difficult to detect. In the past visual analytics approaches aimed at detecting these phenomenons but only a few of these integrated geographical references. Geo-IP data is being used mostly as a lookup table which is an undervaluation of its capabilities. In this paper we present a visual-interactive system which only relies on Geo-IP data to create more awareness for this data source. We show that looking at Geo-IP data over time in combination with owner and location information of IP blocks already reveals suspicious cases. Together with our design study we also contribute a pre-processing algorithm for the Maxmind GeoIP2 City and ISP databases, to motivate the community to integrate this data source in future approaches.
从一台计算机到另一台计算机的网络数据包路由是互联网的骨干,影响着许多人的日常生活。虽然这是一个完全自动化的过程,但它有许多安全问题。IP劫持和错误配置经常发生,而且很难检测到。在过去,视觉分析方法旨在检测这些现象,但只有少数这些综合地理参考。地理ip数据主要被用作查找表,这是对其功能的低估。在本文中,我们提出了一个视觉交互系统,该系统仅依赖于地理ip数据来创建对该数据源的更多感知。我们表明,随着时间的推移,结合IP块的所有者和位置信息,查看地理IP数据已经揭示了可疑案例。与我们的设计研究一起,我们还为Maxmind GeoIP2城市和ISP数据库提供了预处理算法,以激励社区在未来的方法中整合该数据源。
{"title":"Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data","authors":"Alex Ulmer, Marija Schufrin, D. Sessler, J. Kohlhammer","doi":"10.1109/VIZSEC.2018.8709182","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709182","url":null,"abstract":"Routing of network packets from one computer to another is the backbone of the internet and impacts the everyday life of many people. Although, this is a fully automated process it has many security issues. IP hijacks and misconfigurations occur very often and are difficult to detect. In the past visual analytics approaches aimed at detecting these phenomenons but only a few of these integrated geographical references. Geo-IP data is being used mostly as a lookup table which is an undervaluation of its capabilities. In this paper we present a visual-interactive system which only relies on Geo-IP data to create more awareness for this data source. We show that looking at Geo-IP data over time in combination with owner and location information of IP blocks already reveals suspicious cases. Together with our design study we also contribute a pre-processing algorithm for the Maxmind GeoIP2 City and ISP databases, to motivate the community to integrate this data source in future approaches.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117197801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
User Behavior Map: Visual Exploration for Cyber Security Session Data 用户行为图:网络安全会话数据的可视化探索
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709223
Siming Chen, Shuai Chen, N. Andrienko, G. Andrienko, P. H. Nguyen, C. Turkay, Olivier Thonnard, Xiaoru Yuan
User behavior analysis is complex and especially crucial in the cyber security domain. Understanding dynamic and multi-variate user behavior are challenging. Traditional sequential and timeline based method cannot easily address the complexity of temporal and relational features of user behaviors. We propose a map-based visual metaphor and create an interactive map for encoding user behaviors. It enables analysts to explore and identify user behavior patterns and helps them to understand why some behaviors are regarded as anomalous. We experiment with a real dataset containing multiple user sessions, consisting of sequences of diverse types of actions. In the behavior map, we encode an action as a city and user sessions as trajectories going through the cities. The position of the cities is determined by the sequential and temporal relationship of actions. Spatial and temporal patterns on the map reflect behavior patterns in the action space. In the case study, we illustrate how we explore relationships between actions, identify patterns of the typical session and detect anomaly behaviors.
用户行为分析非常复杂,在网络安全领域尤为重要。理解动态和多变量的用户行为是具有挑战性的。传统的基于序列和时间线的方法不能很容易地处理用户行为的时间和关系特征的复杂性。我们提出了一种基于地图的视觉隐喻,并创建了一种用于编码用户行为的交互式地图。它使分析人员能够探索和识别用户行为模式,并帮助他们理解为什么一些行为被认为是异常的。我们使用包含多个用户会话的真实数据集进行实验,该数据集由不同类型的动作序列组成。在行为图中,我们将一个动作编码为一个城市,将用户会话编码为穿过城市的轨迹。城市的位置是由行动的顺序和时间关系决定的。地图上的空间和时间模式反映了行动空间中的行为模式。在案例研究中,我们说明了如何探索操作之间的关系,识别典型会话的模式并检测异常行为。
{"title":"User Behavior Map: Visual Exploration for Cyber Security Session Data","authors":"Siming Chen, Shuai Chen, N. Andrienko, G. Andrienko, P. H. Nguyen, C. Turkay, Olivier Thonnard, Xiaoru Yuan","doi":"10.1109/VIZSEC.2018.8709223","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709223","url":null,"abstract":"User behavior analysis is complex and especially crucial in the cyber security domain. Understanding dynamic and multi-variate user behavior are challenging. Traditional sequential and timeline based method cannot easily address the complexity of temporal and relational features of user behaviors. We propose a map-based visual metaphor and create an interactive map for encoding user behaviors. It enables analysts to explore and identify user behavior patterns and helps them to understand why some behaviors are regarded as anomalous. We experiment with a real dataset containing multiple user sessions, consisting of sequences of diverse types of actions. In the behavior map, we encode an action as a city and user sessions as trajectories going through the cities. The position of the cities is determined by the sequential and temporal relationship of actions. Spatial and temporal patterns on the map reflect behavior patterns in the action space. In the case study, we illustrate how we explore relationships between actions, identify patterns of the typical session and detect anomaly behaviors.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics Eventpad:使用可视化分析的快速恶意软件分析和逆向工程
Pub Date : 2018-10-01 DOI: 10.1109/VIZSEC.2018.8709230
B. Cappers, Paulus N. Meessen, S. Etalle, J. V. Wijk
Forensic analysis of malware activity in network environments is a necessary yet very costly and time consuming part of incident response. Vast amounts of data need to be screened, in a very labor-intensive process, looking for signs indicating how the malware at hand behaves inside e.g., a corporate network. We believe that data reduction and visualization techniques can assist security analysts in studying behavioral patterns in network traffic samples (e.g., PCAP). We argue that the discovery of patterns in this traffic can help us to quickly understand how intrusive behavior such as malware activity unfolds and distinguishes itself from the rest of the traffic.In this paper we present a case study of the visual analytics tool EventPad and illustrate how it is used to gain quick insights in the analysis of PCAP traffic using rules, aggregations, and selections. We show the effectiveness of the tool on real-world data sets involving office traffic and ransomware activity.
对网络环境中的恶意软件活动进行取证分析是必要的,但在事件响应中非常昂贵且耗时。在一个非常劳动密集型的过程中,需要筛选大量的数据,寻找表明恶意软件在公司网络中如何表现的迹象。我们相信数据简化和可视化技术可以帮助安全分析师研究网络流量样本中的行为模式(例如,PCAP)。我们认为,在这种流量模式的发现可以帮助我们快速了解入侵行为,如恶意软件活动如何展开,并与其他流量区分开来。在本文中,我们介绍了一个可视化分析工具EventPad的案例研究,并说明了如何使用它来快速洞察使用规则,聚合和选择的PCAP流量分析。我们展示了该工具在涉及办公室流量和勒索软件活动的真实数据集上的有效性。
{"title":"Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics","authors":"B. Cappers, Paulus N. Meessen, S. Etalle, J. V. Wijk","doi":"10.1109/VIZSEC.2018.8709230","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709230","url":null,"abstract":"Forensic analysis of malware activity in network environments is a necessary yet very costly and time consuming part of incident response. Vast amounts of data need to be screened, in a very labor-intensive process, looking for signs indicating how the malware at hand behaves inside e.g., a corporate network. We believe that data reduction and visualization techniques can assist security analysts in studying behavioral patterns in network traffic samples (e.g., PCAP). We argue that the discovery of patterns in this traffic can help us to quickly understand how intrusive behavior such as malware activity unfolds and distinguishes itself from the rest of the traffic.In this paper we present a case study of the visual analytics tool EventPad and illustrate how it is used to gain quick insights in the analysis of PCAP traffic using rules, aggregations, and selections. We show the effectiveness of the tool on real-world data sets involving office traffic and ransomware activity.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125262391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Visualizing Automatically Detected Periodic Network Activity 可视化自动检测到的周期性网络活动
Pub Date : 2018-09-14 DOI: 10.1109/VIZSEC.2018.8709177
R. Gove, Lauren Deason
Malware frequently leaves periodic signals in network logs, but these signals are easily drowned out by non-malicious periodic network activity, such as software updates and other polling activity. This paper describes a novel algorithm based on Discrete Fourier Transforms capable of detecting multiple distinct period lengths in a given time series. We pair the output of this algorithm with aggregation summary tables that give users information scent about which detections are worth investigating based on the metadata of the log events rather than the periodic signal. A visualization of selected detections enables users to see all detected period lengths per entity, and compare detections between entities to check for coordinated activity. We evaluate our approach on real-world netflow and DNS data from a large organization, demonstrating how to successfully find malicious periodic activity in a large pool of noise and non-malicious periodic activity.
恶意软件经常在网络日志中留下周期性信号,但这些信号很容易被非恶意的周期性网络活动(如软件更新和其他轮询活动)淹没。本文提出了一种基于离散傅里叶变换的新算法,该算法能够检测给定时间序列中的多个不同周期长度。我们将该算法的输出与聚合汇总表配对,聚合汇总表根据日志事件的元数据而不是周期信号,为用户提供关于哪些检测值得调查的信息。所选检测的可视化使用户能够看到每个实体检测到的所有周期长度,并比较实体之间的检测以检查协调的活动。我们在一个大型组织的真实netflow和DNS数据上评估了我们的方法,演示了如何在大量噪音和非恶意周期性活动中成功发现恶意周期性活动。
{"title":"Visualizing Automatically Detected Periodic Network Activity","authors":"R. Gove, Lauren Deason","doi":"10.1109/VIZSEC.2018.8709177","DOIUrl":"https://doi.org/10.1109/VIZSEC.2018.8709177","url":null,"abstract":"Malware frequently leaves periodic signals in network logs, but these signals are easily drowned out by non-malicious periodic network activity, such as software updates and other polling activity. This paper describes a novel algorithm based on Discrete Fourier Transforms capable of detecting multiple distinct period lengths in a given time series. We pair the output of this algorithm with aggregation summary tables that give users information scent about which detections are worth investigating based on the metadata of the log events rather than the periodic signal. A visualization of selected detections enables users to see all detected period lengths per entity, and compare detections between entities to check for coordinated activity. We evaluate our approach on real-world netflow and DNS data from a large organization, demonstrating how to successfully find malicious periodic activity in a large pool of noise and non-malicious periodic activity.","PeriodicalId":412565,"journal":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2018 IEEE Symposium on Visualization for Cyber Security (VizSec)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1