EEVi - framework for evaluating the effectiveness of visualization in cyber-security

作者: Aneesha Sethi , Federica Paci , Gary Wills

DOI: 10.1109/ICITST.2016.7856726

关键词:

摘要: Cyber-security visualization is an up-and-coming area which aims to reduce security analysts' workload by presenting information as visual analytics rather than a string of text and characters. But the adoption resultant visualizations has not increased. The literature indicates research gap lack guidelines standardized evaluation techniques for effective in cyber-security, reason it. Therefore, this addresses developing framework called EEVi cyber-security performed task. term ‘effective visualization’ can be defined features that are crucial perform certain task successfully. been developed analyzing qualitative data leads formation cognitive relationships (called links) between act terms methodology develop applied other fields understand data. Additionally, analysis presents glimpse into usage visualization.

参考文章(19)
Ioannis Agrafiotis, Jason RC Nurse, Oliver Buckley, Phil Legg, Sadie Creese, Michael Goldsmith, Identifying attack patterns for insider threat detection Computer Fraud & Security. ,vol. 2015, pp. 9- 17 ,(2015) , 10.1016/S1361-3723(15)30066-X
Beth Crandall, Gary A. Klein, Robert R. Hoffman, Working Minds: A Practitioner's Guide to Cognitive Task Analysis ,(2006)
Marco Angelini, Nicolas Prigent, Giuseppe Santucci, PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics visualization for computer security. pp. 1- 8 ,(2015) , 10.1109/VIZSEC.2015.7312764
Dustin L. Arendt, Russ Burtner, Daniel M. Best, Nathan D. Bos, John R. Gersh, Christine D. Piatko, Celeste Lyn Paul, Ocelot: user-centered design of a decision support visualization for network quarantine visualization for computer security. pp. 1- 8 ,(2015) , 10.1109/VIZSEC.2015.7312763
Sean Mckenna, Diane Staheli, Miriah Meyer, Unlocking user-centered design methods for building cyber security visualizations visualization for computer security. pp. 1- 8 ,(2015) , 10.1109/VIZSEC.2015.7312771
Antonie J. Jetter, Fatima M. Albar, Uncovering project screening heuristics with cognitive task analysis: How do gatekeepers decide which technologies to promote? portland international conference on management of engineering and technology. pp. 459- 467 ,(2013)
Daniel M. Best, Alex Endert, Daniel Kidwell, 7 key challenges for visualization in cyber network defense visualization for computer security. pp. 33- 40 ,(2014) , 10.1145/2671491.2671497
Virginia Braun, Victoria Clarke, Using thematic analysis in psychology Qualitative Research in Psychology. ,vol. 3, pp. 77- 101 ,(2006) , 10.1191/1478088706QP063OA
Sadie Creese, Michael Goldsmith, Nick Moffat, Jassim Happa, Ioannis Agrafiotis, CyberVis: Visualizing the potential impact of cyber attacks on the wider enterprise ieee international conference on technologies for homeland security. pp. 73- 79 ,(2013) , 10.1109/THS.2013.6698979
Diane Staheli, Tamara Yu, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, David O'Gwynn, Sean McKenna, Lane Harrison, Visualization evaluation for cyber security: trends and future directions visualization for computer security. pp. 49- 56 ,(2014) , 10.1145/2671491.2671492