Putting security in context: Visual correlation of network activity with real-world information

被引:8
|
作者
Pike, W. A. [1 ]
Scherrer, C. [1 ]
Zabriskie, S. [1 ]
机构
[1] Pacific NW Natl Lab, Richland, WA 99352 USA
来源
VIZSEC 2007 | 2008年
关键词
D O I
10.1007/978-3-540-78243-8_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the analyst's world knowledge that puts these attributes in context. What known exploits or new vulnerabilities might an anomalous traffic pattern suggest? What organizational, social, or geopolitical events help forecast or explain attacks and anomalies? Few visualization tools support creating, maintaining, and applying this knowledge of the threat landscape. Through a series of formative workshops with practicing security analysts, we have developed a visualization approach inspired by the human process of contextualization; this system, called NUANCE, creates evolving behavioral models of network actors at organizational and regional levels, continuously monitors external textual information sources for themes that indicate security threats, and automatically determines if behavior indicative of those threats is present on a network.
引用
收藏
页码:203 / 220
页数:18
相关论文
共 50 条
  • [1] Anticipation in Real-World Scenes: The Role of Visual Context and Visual Memory
    Coco, Moreno I.
    Keller, Frank
    Malcolm, George L.
    [J]. COGNITIVE SCIENCE, 2016, 40 (08) : 1995 - 2024
  • [2] Guidance of visual attention by semantic information in real-world scenes
    Wu, Chia-Chien
    Wick, Farahnaz Ahmed
    Pomplun, Marc
    [J]. FRONTIERS IN PSYCHOLOGY, 2014, 5
  • [3] Counting on AR: EEG responses to incongruent information with real-world context
    Wimmer, Michael
    Pepicelli, Alex
    Volmer, Ben
    ElSayed, Neven
    Cunningham, Andrew
    Thomas, Bruce H.
    Müller-Putz, Gernot R.
    Veas, Eduardo E.
    [J]. Computers in Biology and Medicine, 2025, 185
  • [4] Social network and spatial semantics for real-world information service
    Matsuo, Y
    [J]. MASSIVELY MULTI-AGENT SYSTEMS I, 2005, 3446 : 254 - 268
  • [6] Modelling user's activity in a real-world complex network
    Pellicer-Lostao, Carmen
    Morato, Daniel
    Lopez-Ruiz, Ricardo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2008, 85 (08) : 1287 - 1298
  • [7] Real-World Vehicle Mobility Modeling Based on Wireless Network Information
    Momen, Amir Reza
    Hassani, Ali Sheikh
    Azmi, Paeiz
    [J]. 2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 2319 - +
  • [8] Putting lexical constraints in context into the visual-world paradigm
    Novick, Jared M.
    Thompson-Schill, Sharon L.
    Trueswell, John C.
    [J]. COGNITION, 2008, 107 (03) : 850 - 903
  • [9] Real-World VANET Security Protocol Performance
    Haas, Jason J.
    Hu, Yih-Chun
    Laberteaux, Kenneth P.
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2629 - +
  • [10] Security Applications: Lessons of Real-World Deployment
    Pita, James
    Bellamane, Harish
    Jain, Manish
    Kiekintveld, Chris
    Tsai, Jason
    Ordonez, Fernando
    Tambe, Milind
    [J]. ACM SIGECOM EXCHANGES, 2009, 8 (02)