User Behavior Map: Visual Exploration for Cyber Security Session Data

被引:0
|
作者
Chen, Siming [1 ,5 ]
Chen, Shuai [2 ]
Andrienko, Natalia [1 ,3 ]
Andrienko, Gennady [1 ,3 ]
Nguyen, Phong H. [3 ]
Turkay, Cagatay [3 ]
Thonnard, Olivier [4 ]
Yuan, Xiaoru [2 ,6 ,7 ]
机构
[1] Fraunhofer IAIS, St Augustin, Germany
[2] Peking Univ, Beijing, Peoples R China
[3] City Univ London, London, England
[4] Amadeus, Madrid, Spain
[5] Univ Bonn, Bonn, Germany
[6] Peking Univ, Minist Educ, Key Lab Machine Percept, Beijing, Peoples R China
[7] Peking Univ, Sch EECS, Beijing, Peoples R China
关键词
Behavior Analysis; Map Metaphor; Cyber Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User behavior analysis is complex and especially crucial in the cyber security domain. Understanding dynamic and multi-variate user behavior are challenging. Traditional sequential and timeline based method cannot easily address the complexity of temporal and relational features of user behaviors. We propose a map-based visual metaphor and create an interactive map for encoding user behaviors. It enables analysts to explore and identify user behavior patterns and helps them to understand why some behaviors are regarded as anomalous. We experiment with a real dataset containing multiple user sessions, consisting of sequences of diverse types of actions. In the behavior map, we encode an action as a city and user sessions as trajectories going through the cities. The position of the cities is determined by the sequential and temporal relationship of actions. Spatial and temporal patterns on the map reflect behavior patterns in the action space. In the case study, we illustrate how we explore relationships between actions, identify patterns of the typical session and detect anomaly behaviors.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Massive Data Mining, Cyber Security Approach
    Guizani, Sghaier
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 1368 - 1372
  • [42] Visual exploration of microbiome data
    Kuntal, Bhusan K.
    Mande, Sharmila S.
    JOURNAL OF BIOSCIENCES, 2019, 44 (05)
  • [43] Redefining Cyber Security with Big Data Analytics
    Apurva, Aviral
    Ranakoti, Pranshu
    Yadav, Saurav
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 199 - 203
  • [44] Cyber Security Automation for Controlling Distributed Data
    Deore, Ujjwala D.
    Waghmare, Vijaya
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [45] DATA AND CYBER SECURITY IN AUTONOMOUS VEHICLE NETWORKS
    Raiyn, Jamal
    TRANSPORT AND TELECOMMUNICATION JOURNAL, 2018, 19 (04) : 325 - 334
  • [46] Privacy Principles for Sharing Cyber Security Data
    Fisk, Gina
    Ardi, Calvin
    Pickett, Neale
    Heidemann, John
    Fisk, Mike
    Papadopoulos, Christos
    2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 193 - 197
  • [47] Prefetching for visual data exploration
    Doshi, PR
    Rundensteiner, EA
    Ward, MO
    EIGHTH INTERNATIONAL CONFERENCE ON DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2003, : 195 - 202
  • [48] Visual exploration of genomic data
    Vlachos, Michail
    Taneri, Bahar
    Keogh, Eamonn
    Yu, Philip S.
    KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2007, PROCEEDINGS, 2007, 4702 : 613 - +
  • [49] Cyber Security Through Multidimensional Data Decompositions
    Bruns-Smith, David
    Baskaran, Muthu M.
    Ezick, James
    Henretty, Tom
    Lethin, Richard
    2016 CYBERSECURITY SYMPOSIUM, 2016, : 59 - 67
  • [50] Big Data In computer Cyber Security Systems
    AlMadahkah, Amani Mobarak
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 56 - 65