User Behavior Map: Visual Exploration for Cyber Security Session Data

被引:0
|
作者
Chen, Siming [1 ,5 ]
Chen, Shuai [2 ]
Andrienko, Natalia [1 ,3 ]
Andrienko, Gennady [1 ,3 ]
Nguyen, Phong H. [3 ]
Turkay, Cagatay [3 ]
Thonnard, Olivier [4 ]
Yuan, Xiaoru [2 ,6 ,7 ]
机构
[1] Fraunhofer IAIS, St Augustin, Germany
[2] Peking Univ, Beijing, Peoples R China
[3] City Univ London, London, England
[4] Amadeus, Madrid, Spain
[5] Univ Bonn, Bonn, Germany
[6] Peking Univ, Minist Educ, Key Lab Machine Percept, Beijing, Peoples R China
[7] Peking Univ, Sch EECS, Beijing, Peoples R China
关键词
Behavior Analysis; Map Metaphor; Cyber Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User behavior analysis is complex and especially crucial in the cyber security domain. Understanding dynamic and multi-variate user behavior are challenging. Traditional sequential and timeline based method cannot easily address the complexity of temporal and relational features of user behaviors. We propose a map-based visual metaphor and create an interactive map for encoding user behaviors. It enables analysts to explore and identify user behavior patterns and helps them to understand why some behaviors are regarded as anomalous. We experiment with a real dataset containing multiple user sessions, consisting of sequences of diverse types of actions. In the behavior map, we encode an action as a city and user sessions as trajectories going through the cities. The position of the cities is determined by the sequential and temporal relationship of actions. Spatial and temporal patterns on the map reflect behavior patterns in the action space. In the case study, we illustrate how we explore relationships between actions, identify patterns of the typical session and detect anomaly behaviors.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User
    Carroll, Fiona
    Legg, Phil
    Bonkel, Bastian
    2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
  • [2] Information Technology Change and the Effects on User Behavior and Cyber Security
    Browne, Glenn
    Safi, Roozmehr
    AMCIS 2015 PROCEEDINGS, 2015,
  • [3] socialRadius: Visual Exploration of User Check-in Behavior Based on Social Media Data
    Wen, Changjiang
    Teng, Zhiyao
    Chen, Jian
    Wu, Yifan
    Gong, Rui
    Pu, Jiansu
    COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, CDVE 2016, 2016, 9929 : 300 - 308
  • [4] Secure Session on Mobile: An Exploration on Combining Biometric, TrustZone, and User Behavior
    Feng, Tao
    DeSalvo, Nicholas
    Xu, Lei
    Zhao, Xi
    Wang, Xi
    Shi, Weidong
    2014 6TH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING, APPLICATIONS AND SERVICES (MOBICASE), 2014, : 206 - 215
  • [5] A CYBER-SECURITY STORM MAP
    Ferebee, Denise
    Dasgupta, Dipankar
    Wu, Qishi
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 93 - 102
  • [6] A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security
    Zhong Zengsheng
    Zhao Ying
    Shi Ronghua
    Sheng Yingshuai
    Liu Junrong
    Meng Hua
    Lin Dan
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (05) : 910 - 919
  • [7] A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security
    ZHONG Zengsheng
    ZHAO Ying
    SHI Ronghua
    SHENG Yingshuai
    LIU Junrong
    MENG Hua
    LIN Dan
    Chinese Journal of Electronics, 2018, 27 (05) : 910 - 919
  • [8] Visual Analytics for cyber security and intelligence
    Lavigne, Valerie
    Gouin, Denis
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2014, 11 (02): : 175 - 199
  • [9] Mobile Devices and Cyber Security An Exploratory Study on User's Response to Cyber Security Challenges
    Kauthamy, Kanthithasan
    Ashrafi, Noushin
    Kuilboer, Jean-Pierre
    WEBIST: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2017, : 306 - 311
  • [10] Data mining and Cyber security
    Thuraisingham, B
    THIRD INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2003, : 2 - 2