User Behavior Map: Visual Exploration for Cyber Security Session Data

被引:0
|
作者
Chen, Siming [1 ,5 ]
Chen, Shuai [2 ]
Andrienko, Natalia [1 ,3 ]
Andrienko, Gennady [1 ,3 ]
Nguyen, Phong H. [3 ]
Turkay, Cagatay [3 ]
Thonnard, Olivier [4 ]
Yuan, Xiaoru [2 ,6 ,7 ]
机构
[1] Fraunhofer IAIS, St Augustin, Germany
[2] Peking Univ, Beijing, Peoples R China
[3] City Univ London, London, England
[4] Amadeus, Madrid, Spain
[5] Univ Bonn, Bonn, Germany
[6] Peking Univ, Minist Educ, Key Lab Machine Percept, Beijing, Peoples R China
[7] Peking Univ, Sch EECS, Beijing, Peoples R China
关键词
Behavior Analysis; Map Metaphor; Cyber Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User behavior analysis is complex and especially crucial in the cyber security domain. Understanding dynamic and multi-variate user behavior are challenging. Traditional sequential and timeline based method cannot easily address the complexity of temporal and relational features of user behaviors. We propose a map-based visual metaphor and create an interactive map for encoding user behaviors. It enables analysts to explore and identify user behavior patterns and helps them to understand why some behaviors are regarded as anomalous. We experiment with a real dataset containing multiple user sessions, consisting of sequences of diverse types of actions. In the behavior map, we encode an action as a city and user sessions as trajectories going through the cities. The position of the cities is determined by the sequential and temporal relationship of actions. Spatial and temporal patterns on the map reflect behavior patterns in the action space. In the case study, we illustrate how we explore relationships between actions, identify patterns of the typical session and detect anomaly behaviors.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Cooperative Exploration, Localization, and Visual Map Construction
    Rekleitis, Ioannis M.
    Sim, Robert
    Dudek, Gregory
    BRAIN, BODY AND MACHINE, 2010, 83 : 227 - +
  • [32] Cyber Security Paradox from a User's View Point
    Kopecky, Sandra
    2017 COMPUTING CONFERENCE, 2017, : 783 - 787
  • [33] Visual exploration of rating datasets and user groups
    Zegarra, Fabian Colque
    Carbajal Ipenza, Juan C.
    Omidvar-Tehrani, Behrooz
    Moreira, Viviane P.
    Amer-Yahia, Sihem
    Comba, Joao L. D.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 105 (547-561): : 547 - 561
  • [34] Cyber Security - How Visual Analytics Unlock Insight
    Marty, Raffael
    19TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'13), 2013, : 1139 - 1139
  • [35] Statistical Reliability of 10 Years of Cyber Security User Studies
    Gross, Thomas
    SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2020, 2021, 12812 : 171 - 190
  • [36] User, Usage and Usability: Redefining Human Centric Cyber Security
    Grobler, Marthie
    Gaire, Raj
    Nepal, Surya
    FRONTIERS IN BIG DATA, 2021, 4
  • [37] Arabic Twitter User Profiling: Application to Cyber-security
    Basti, Rahma
    Jamoussi, Salma
    Charfi, Anis
    Ben Hamadou, Abdelmajid
    WEBIST: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2019, : 110 - 117
  • [38] Visual aesthetics and user experience: A multiple-session experiment
    Sauer, Juergen
    Sonderegger, Andreas
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2022, 165
  • [39] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [40] Detecting Periodic Subsequences in Cyber Security Data
    Price-Williams, Matthew
    Heard, Nick
    Turcotte, Melissa
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 84 - 90