Abstract
This paper aims at finding optimal visualization models for representation and analysis of security related data, for example, security metrics, security incidents and cyber attack countermeasures. The classification of the most important security metrics and their characteristics that are important for their visualization are considered. The paper reviews existing and suggested research by the author’s data representation and visualization models. In addition, the most suitable models for different metric groups are outlined and analyzed. A case study is presented as an illustration on the way the visualization models are integrated with different metrics for security awareness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Schmidt, M.: Return on Investment (ROI): Meaning and Use. Encyclopedia of Business Terms and Methods (2011). http://www.solutionmatrix.com/return-on-investment.html
Sonnenreich, W., Albanese, J., Stout, B.: Return on security Investment (ROSI) a practical quantitative model. J. Res. Pract. Inf. Technol. 38(1), 45–56 (2006)
Kolomeets, M., Chechulin, A., Kotenko, I.: Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams. In: International Cross-Domain Conference, and Workshop on Privacy Aware Machine Learning for Health Data Science (2016)
Doynikova, E., Kotenko, I.: Countermeasure selection based on the attack and service dependency graphs for security incident management. In: Lambrinoudakis, C., Gabillon, A. (eds.) CRiSIS 2015. LNCS, vol. 9572, pp. 107–124. Springer, Cham (2016). doi:10.1007/978-3-319-31811-0_7
Gonzalez Granadillo, G., Garcia-Alfaro, J., Debar, H.: Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. In: Security and Privacy in Communication Networks, pp. 26–29 (2015)
Gonzalez Granadillo, G., Alvarez, E., El-Barbori, M., Garcia-Alfaro, J., Debar, H.: Selecting optimal countermeasures for attacks against critical systems using the Attack Volume model and the RORI index. J. Comput. Electr. Eng. 13–34 (2015)
Kheir, N., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: A service dependency model for cost-sensitive intrusion response. In: 15th European Symposium on Research in Computer Security (ESORICS), pp. 626–642 (2010)
Dini, G., Tiloca, M.: A simulation tool for evaluating attack impact in cyber physical systems. In: International Workshop Modelling and Simulation for Autonomous Systems, pp. 77–94 (2014)
Howard, M., Wing, J.: Measuring relative attack surfaces. In: Computer Security in the 21st Century, pp. 109–137 (2005)
Manadhata, P., Wing, J.: An attack surface metric. J. IEEE Trans. Softw. Eng. 37(3), 371–386 (2011)
Mell, P., Scarforne, K., Romanosky, S.: A complete guide to the common vulnerability scoring system (CVSS) version 2.0. In: FIRST-Forum of Incident Response and Security Teams, p. 23 (2007)
The Center for Internet Security. The CIS Security Metrics, 175 p. (2009)
Kotenko, I.V., Doynikova, E.: Dynamical calculation of security metrics for countermeasure selection in computer networks. In: 24th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2016), pp. 558–565. IEEE Computer Society, Los Alamitos (2016)
Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graphs. NIST Interagency Report 7788, Gaithersburg: National Institute of Standards and Technology, 24 p. (2011)
Puangsri, P.: Quantified return on information security investment - a model for cost-benefit analysis. Master Thesis, Delft University of Technology (2009)
Gonzalez Granadillo, G., Garcia-Alfaro, J., Debar, H.: An n-sided polygonal model to calculate the impact of cyber security events. In: International Conference on Risks and Security of Internet and Systems (2016)
Special operations forces intelligence and electronic warfare operations, appendix D: Target analysis process, Federation of American Scientists (1991). http://www.fas.org/irp/doddir/army/fm34-36/appd.htm
Gonzalez Granadillo, G., Rubio-Hernan, J., Garcia-Alfaro, J., Debar, H.: Considering internal vulnerabilities and the attacker’s knowledge to model the impact of cyber events as geometrical prisms. In: Conference on Trust, Security and Privacy in Computing and Communications (2016)
Leborg, C.: Visual Grammar, 1st edn, p. 96. Princeton Architectural Press, New York (2006)
Kolomeec, M.V., Chechulin, A.A., Kotenko, I.V.: Methodological primitives for phased construction of data visualization models. J. Internet Serv. Inf. Secur. (JISIS) 5(4), 60–84 (2015)
Holten, D.: Hierarchical edge bundles: visualization of adjacency relations in hierarchical data. IEEE Trans. Vis. Comput. Graph. 12(5) (2006)
Haber, R.B., McNabb, D.A.: Visualization idioms: a conceptual model for scientific visualization systems. In: Visualization in Scientific Computing, pp. 74–93. IEEE Computer Society Press (1990)
Kundur, D., Feng, X., Liu, S., Zourntos, T., Butler-Purry, K.L.: Towards a framework for cyber attack impact analysis of the electric smart grid. In: International Conference on Smart Grid Communications, pp. 244–249 (2010)
Duan, C., Cleland-Huang, J.: Automated safeguard selection strategies. In: CTI Research Symposium (2006)
Acknowledgements
This research is being supported by the grant of RSF #15-11-30029 in SPIIRAS.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Kolomeec, M., Gonzalez-Granadillo, G., Doynikova, E., Chechulin, A., Kotenko, I., Debar, H. (2017). Choosing Models for Security Metrics Visualization. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-65127-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65126-2
Online ISBN: 978-3-319-65127-9
eBook Packages: Computer ScienceComputer Science (R0)