skip to main content
10.1145/2801040.2801052acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvinciConference Proceedingsconference-collections
research-article

Visual Cyber Situational Awareness for Critical Infrastructures

Published: 24 August 2015 Publication History

Abstract

The increasing number of security accidents, due to failures or cyber attacks, that critical infrastructures/smart grids are experimenting is pushing researchers to investigate on the different issues associated with such a problem. Among them, an increasing attention has been devoted to the development of monitoring systems that exploit geographical data about the network under control. This papers focuses on situational awareness and describes a Visual Analytics solution for monitoring and put in tight relation data from network level (computers, routers, etc.) with organization's mission. The goal of the proposed solution is to make security officers aware of both the actual network endangerment level and the impact it actually has on the infrastructure mission, making clear the relationships and the responsibilities that exist between the network level and the business level. The solution proposed is then instantiated on ACEA infrastructure, a company that provides power and water purification services to cities in central Italy (millions of end users).

References

[1]
The Official Website of the PANOPTESEC Project, http://www.panoptesec.eu/, 2014.
[2]
P. Barford, M. Dacier, T. G. Dietterich, M. Fredrikson, J. Giffin, S. Jajodia, S. Jha, J. Li, P. Liu, P. Ning, et al. Cyber SA: Situational awareness for cyber defense. Springer, 2010.
[3]
R. Bearavolu, K. Lakkaraju, W. Yurcik, and H. Raje. A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks. In Military Communications Conference, 2003. MILCOM'03. 2003 IEEE, volume 2, pages 850--855. IEEE, 2003.
[4]
S. C. Carroll. Mission impact analysis visualization for enhanced situational awareness. Technical report, DTIC Document, 2008.
[5]
V. Y. Chen, S. Ko, D. S. Ebert, C. Z. Qian, and A. M. Razip. Semanticprism: A multi-aspect view of large high-dimensional data: Vast 2012 mini challenge 1 award: Outstanding integrated analysis and visualization. In Proceedings of the 2012 IEEE Conference on Visual Analytics Science and Technology (VAST), VAST '12, pages 259--260, Washington, DC, USA, 2012. IEEE Computer Society.
[6]
S. Creese, M. Goldsmith, N. Moffat, J. Happa, and I. Agrafiotis. Cybervis: visualizing the potential impact of cyber attacks on the wider enterprise. In Technologies for Homeland Security (HST), 2013 IEEE International Conference on, pages 73--79. IEEE, 2013.
[7]
A. D'Amico and M. Larkin. Methods of visualizing temporal patterns in and mission impact of computer security breaches. In DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings, volume 1, pages 343--351. IEEE, 2001.
[8]
A. D'Amico and S. Salas. Visualization as an aid for assessing the mission impact of information security breaches'. In DARPA Information Survivability Conference and Exposition, 2003. Proceedings, volume 2, pages 190--195. IEEE, 2003.
[9]
M. Dodge. Building an atlas of cyberspace. Cartographic Perspectives, (34):47--52, 1999.
[10]
R. F. Erbacher. Visualization design for immediate high-level situational assessment. In Proceedings of the Ninth International Symposium on Visualization for Cyber Security, pages 17--24. ACM, 2012.
[11]
U. Franke and J. Brynielsson. Cyber situational awareness--a systematic review of the literature. Computers & Security, 46:18--31, 2014.
[12]
C. Gates and S. Engle. Reflecting on visualization for cyber security. In ISI, pages 275--277, 2013.
[13]
N. Giacobe and S. Xu. Geovisual analytics for cyber security: Adopting the geoviz toolkit. In Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on, pages 315--316, Oct 2011.
[14]
J. R. Goodall and M. Sowul. Viassist: Visual analytics for cyber defense. In Technologies for Homeland Security, 2009. HST'09. IEEE Conference on, pages 143--150. IEEE, 2009.
[15]
M. Grégoire and L. Beaudoin. Visualisation for network situational awareness in computer network defence. Visualisation and the Common Operational Picture, pages 20--1, 2005.
[16]
M. R. Grimaila, R. F. Mills, and L. W. Fortson. Improving the cyber incident mission impact assessment (cimia) process. In Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, CSIIRW '08, pages 32:1--32:2, New York, NY, USA, 2008. ACM.
[17]
F. Hardisty and A. C. Robinson. The geoviz toolkit: using component-oriented coordination methods for geographic visualization and analysis. International Journal of Geographical Information Science, 25(2):191--210, 2011.
[18]
Y. Hideshima and H. Koike. Starmine: A visualization system for cyber attacks. In Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60, APVis '06, pages 131--138, Darlinghurst, Australia, Australia, 2006. Australian Computer Society, Inc.
[19]
E. Karapistoli, P. Sarigiannidis, and A. A. Economides. Srnet: a real-time, cross-based anomaly detection and visualization system for wireless sensor networks. In Proceedings of the Tenth Workshop on Visualization for Cyber Security, pages 49--56. ACM, 2013.
[20]
L. Lewis, G. Jakobson, and J. Buford. Enabling cyber situation awareness, impact assessment, and situation projection. In Military Communications Conference, 2008. MILCOM 2008. IEEE, pages 1--6. IEEE, 2008.
[21]
K.-L. Ma. Cyber security through visualization. In Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pages 3--7. Australian Computer Society, Inc., 2006.
[22]
W. J. Matuszak, L. DiPippo, and Y. L. Sun. Cybersave: situational awareness visualization for cyber security of smart grid systems. In Proceedings of the Tenth Workshop on Visualization for Cyber Security, pages 25--32. ACM, 2013.
[23]
M. Nusinov, S. J. Yang, J. Holsopple, and M. Sudit. Visaw: Visualizing threat and impact assessment for enhanced situation awareness. In Military Communications Conference, 2009. MILCOM 2009. IEEE, pages 1--7. IEEE, 2009.
[24]
N. Stockman, K. G. Vamvoudakis, L. Devendorf, T. Höllerer, R. Kemmerer, and J. P. Hespanha. A mission-centric visualization tool for cybersecurity situation awareness. Technical report, DTIC Document, 2012.
[25]
L.-s. YAN, T.-m. BAI, and S. WANG. Security situation awareness based on visualization {j}. Communications Technology, 10:052, 2008.

Cited By

View all
  • (2022)Insights on Cooperative Defense for Multiple Industrial Security TechnologiesProceedings of the 2022 12th International Conference on Communication and Network Security10.1145/3586102.3586127(168-173)Online publication date: 1-Dec-2022
  • (2022)Uncertainty-aware visual analytics: scope, opportunities, and challengesThe Visual Computer10.1007/s00371-022-02733-639:12(6345-6366)Online publication date: 23-Dec-2022
  • (2022)Cyber Situational Awareness FrontiersSmart Cities: Cyber Situational Awareness to Support Decision Making10.1007/978-3-031-18464-2_3(43-75)Online publication date: 8-Nov-2022
  • Show More Cited By

Index Terms

  1. Visual Cyber Situational Awareness for Critical Infrastructures

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    VINCI '15: Proceedings of the 8th International Symposium on Visual Information Communication and Interaction
    August 2015
    185 pages
    ISBN:9781450334822
    DOI:10.1145/2801040
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 August 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cyber security
    2. large network visualization
    3. situational awareness
    4. visual analytics

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    VINCI '15

    Acceptance Rates

    VINCI '15 Paper Acceptance Rate 12 of 32 submissions, 38%;
    Overall Acceptance Rate 71 of 193 submissions, 37%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Insights on Cooperative Defense for Multiple Industrial Security TechnologiesProceedings of the 2022 12th International Conference on Communication and Network Security10.1145/3586102.3586127(168-173)Online publication date: 1-Dec-2022
    • (2022)Uncertainty-aware visual analytics: scope, opportunities, and challengesThe Visual Computer10.1007/s00371-022-02733-639:12(6345-6366)Online publication date: 23-Dec-2022
    • (2022)Cyber Situational Awareness FrontiersSmart Cities: Cyber Situational Awareness to Support Decision Making10.1007/978-3-031-18464-2_3(43-75)Online publication date: 8-Nov-2022
    • (2021)BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS2021 IEEE Symposium on Visualization for Cyber Security (VizSec)10.1109/VizSec53666.2021.00007(15-25)Online publication date: Oct-2021
    • (2020)A survey of methods supporting cyber situational awareness in the context of smart citiesJournal of Big Data10.1186/s40537-020-00363-07:1Online publication date: 21-Oct-2020
    • (2018)An Attack Graph-based On-line Multi-step Attack DetectorProceedings of the 19th International Conference on Distributed Computing and Networking10.1145/3154273.3154311(1-10)Online publication date: 4-Jan-2018
    • (2018)Cyber situational awarenessJournal of Visualization10.1007/s12650-016-0377-320:3(453-459)Online publication date: 24-Dec-2018
    • (2016)Visual Analytics and Mining over Big Data. Discussing Some Issues and Challenges, and Presenting a Few ExperiencesAdvanced Visual Interfaces. Supporting Big Data Applications10.1007/978-3-319-50070-6_8(104-114)Online publication date: 17-Dec-2016
    • (2015)PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics2015 IEEE Symposium on Visualization for Cyber Security (VizSec)10.1109/VIZSEC.2015.7312764(1-8)Online publication date: 25-Oct-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media