Abstract | ||
---|---|---|
Threats in cybersecurity come in a variety of forms, and combating such threats involves handling a huge amount of data from different sources. It is absolutely necessary to use algorithmic models to defend against these threats. However, all models are sensitive to deviation from the original contexts in which the models were developed. Hence, it is not really an overstatement to say that `all models are wrong'. In this paper, we propose a visual analytics loop for supporting the continuous development of models during their deployment. We describe the roles of three types of operators (monitors, analysts and modelers), present the visualization techniques used at different stages of model development, and demonstrate the utility of this approach in conjunction with a prototype software system for corporate insider threat detection. In many ways, our environment facilitates an agile approach to the development and deployment of models in cybersecurity. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/VIZSEC.2015.7312767 | 2015 IEEE Symposium on Visualization for Cyber Security (VizSec) |
Keywords | Field | DocType |
model development,cybersecurity threats,visual analytics loop,visualization techniques,prototype software system,corporate insider threat detection,agile approach | Data science,Data modeling,Data mining,Software deployment,Software analytics,Computer science,Computer security,Visual analytics,Software system,Insider threat,Analytics,Creative visualization | Conference |
ISSN | Citations | PageRank |
2639-4359 | 1 | 0.39 |
References | Authors | |
30 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Simon J. Walton | 1 | 38 | 5.44 |
Eamonn Maguire | 2 | 359 | 31.64 |
Min Chen | 3 | 1293 | 82.69 |