Jassim Happa
Anomaly detection using pattern-of-life visual metaphors
Happa, Jassim; Bashford-Rogers, Thomas; Agrafiotis, Ioannis; Goldsmith, Michael; Creese, Sadie
Authors
Tom Bashford-Rogers Tom.Bashford-Rogers@uwe.ac.uk
Associate Lecturer - CATE - CCT - UCCT0001
Ioannis Agrafiotis
Michael Goldsmith
Sadie Creese
Abstract
Complex dependencies exist across the technology estate, users and purposes of machines. This can make it difficult to efficiently detect attacks. Visualization to date is mainly used to communicate patterns of raw logs, or to visualize the output of detection systems. In this paper we explore a novel approach to presenting cybersecurity-related information to analysts. Specifically, we investigate the feasibility of using visualizations to make analysts become anomaly detectors using Pattern-of-Life Visual Metaphors. Unlike glyph metaphors, the visualizations themselves (rather than any single visual variable on screen) transform complex systems into simpler ones using different mapping strategies. We postulate that such mapping strategies can yield new, meaningful ways to showing anomalies in a manner that can be easily identified by analysts. We present a classification system to describe machine and human activities on a host machine, a strategy to map machine dependencies and activities to a metaphor. We then present two examples, each with three attack scenarios, running data generated from attacks that affect confidentiality, integrity and availability of machines. Finally, we present three in-depth use-case studies to assess feasibility (i.e. can this general approach be used to detect anomalies in systems?), usability and detection abilities of our approach. Our findings suggest that our general approach is easy to use to detect anomalies in complex systems, but the type of metaphor has an impact on user's ability to detect anomalies. Similar to other anomaly-detection techniques, false positives do exist in our general approach as well. Future work will need to investigate optimal mapping strategies, other metaphors, and examine how our approach compares to and can complement existing techniques.
Journal Article Type | Article |
---|---|
Acceptance Date | Sep 30, 2019 |
Online Publication Date | Oct 21, 2019 |
Publication Date | Oct 21, 2019 |
Deposit Date | Oct 18, 2019 |
Publicly Available Date | Dec 23, 2019 |
Journal | IEEE Access |
Electronic ISSN | 2169-3536 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Peer Reviewed | Peer Reviewed |
Volume | 7 |
Pages | 154018-154034 |
DOI | https://doi.org/10.1109/ACCESS.2019.2948490 |
Keywords | cyber security; visualization; anomaly detection; feasibility study; human factors |
Public URL | https://uwe-repository.worktribe.com/output/3892457 |
Files
Anomaly Detection Using Pattern-of-Life Visual Metaphors
(1.5 Mb)
PDF
Licence
http://creativecommons.org/licenses/by/4.0/
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
Copyright Statement
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/
You might also like
Learning preferential perceptual exposure for HDR displays
(2019)
Journal Article
Olfaction and selective rendering
(2017)
Journal Article
Subjective evaluation of high-fidelity virtual environments for driving simulations
(2017)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search