User Behavior Map: Visual Exploration for Cyber Security Session Data

被引:0
|
作者
Chen, Siming [1 ,5 ]
Chen, Shuai [2 ]
Andrienko, Natalia [1 ,3 ]
Andrienko, Gennady [1 ,3 ]
Nguyen, Phong H. [3 ]
Turkay, Cagatay [3 ]
Thonnard, Olivier [4 ]
Yuan, Xiaoru [2 ,6 ,7 ]
机构
[1] Fraunhofer IAIS, St Augustin, Germany
[2] Peking Univ, Beijing, Peoples R China
[3] City Univ London, London, England
[4] Amadeus, Madrid, Spain
[5] Univ Bonn, Bonn, Germany
[6] Peking Univ, Minist Educ, Key Lab Machine Percept, Beijing, Peoples R China
[7] Peking Univ, Sch EECS, Beijing, Peoples R China
关键词
Behavior Analysis; Map Metaphor; Cyber Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User behavior analysis is complex and especially crucial in the cyber security domain. Understanding dynamic and multi-variate user behavior are challenging. Traditional sequential and timeline based method cannot easily address the complexity of temporal and relational features of user behaviors. We propose a map-based visual metaphor and create an interactive map for encoding user behaviors. It enables analysts to explore and identify user behavior patterns and helps them to understand why some behaviors are regarded as anomalous. We experiment with a real dataset containing multiple user sessions, consisting of sequences of diverse types of actions. In the behavior map, we encode an action as a city and user sessions as trajectories going through the cities. The position of the cities is determined by the sequential and temporal relationship of actions. Spatial and temporal patterns on the map reflect behavior patterns in the action space. In the case study, we illustrate how we explore relationships between actions, identify patterns of the typical session and detect anomaly behaviors.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] The Role of User Behaviour in Improving Cyber Security Management
    Moustafa, Ahmed A.
    Bello, Abubakar
    Maurushat, Alana
    FRONTIERS IN PSYCHOLOGY, 2021, 12
  • [22] An Ensemble approach to Big Data Security (Cyber Security)
    Hashmani, Manzoor Ahmed
    Jameel, Syed Muslim
    Ibrahim, Aidarus M.
    Zaffar, Maryam
    Raza, Kamran
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (09) : 75 - 77
  • [23] Visual End-User Security
    Stobert, Elizabeth
    Biddle, Robert
    2012 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN-CENTRIC COMPUTING (VL/HCC), 2012, : 233 - 234
  • [24] Big Data Analytics for Cyber Security
    Angin, Pelin
    Bhargava, Bharat
    Ranchal, Rohit
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [25] Data Mining and Its Cyber Security
    Qiang, Xinjian
    Cheng, Guojian
    Xiao, Hong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 218 - 221
  • [26] Personal Data in Cyber Systems Security
    Ogiela, Marek R.
    Ogiela, Lidia
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2017, 2018, 611 : 174 - 180
  • [27] DATA PROTECTION AS A PART OF CYBER SECURITY
    Capek, Jan
    IDIMT-2017 - DIGITALIZATION IN MANAGEMENT, SOCIETY AND ECONOMY, 2017, 46 : 289 - 296
  • [28] User Behavior Simulation in ICS Cyber Ranges
    Liu, Chuhan
    Yan, Wei
    Xu, Fengkai
    Yang, Wenlong
    Li, Beibei
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [29] A Data Mining Framework to Predict Cyber Attack for Cyber Security
    Rahman, Md Anisur
    Al-Saggaf, Yeslam
    Zia, Tanveer
    PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 207 - 212
  • [30] User-Defined Interactions for Visual Data Exploration With the Combination of Smartwatch and Large Display
    Xiao, Yiqi
    Liu, Lu
    IEEE ACCESS, 2024, 12 : 78657 - 78679