All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Towards a Visual Analytics Workflow for Cybersecurity Simulations

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F23%3A00130096" target="_blank" >RIV/00216224:14610/23:00130096 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.scitepress.org/Link.aspx?doi=10.5220/0011695000003417" target="_blank" >https://www.scitepress.org/Link.aspx?doi=10.5220/0011695000003417</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.5220/0011695000003417" target="_blank" >10.5220/0011695000003417</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Towards a Visual Analytics Workflow for Cybersecurity Simulations

  • Original language description

    One of the contemporary grand challenges in cybersecurity research is designing and evaluating effective attack strategies on network infrastructures performed by autonomous agents. These attackers are developed and trained in simulated environments. While the simulation environments are maturing, their support for analyzing the simulation data remains limited, mainly to inspect individual simulation runs. Extending the analytical workflow to compare multiple runs and integrating visualizations could improve the design of both attack and defense strategies. Through our work, we want to spark interest in the largely overlooked domain of visual analytics for cybersecurity simulation workflows. In this paper, we a) analyze the current state of the art of using visualizations in cybersecurity simulations; b) conceptualize the three-tier analytical workflow and identify user tasks with suggested visualizations for each tier; c) demonstrate the use of visualizations that augment existing CYST simulator on several real-world tasks and discuss the limitations and lessons learned.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    <a href="/en/project/EF16_019%2F0000822" target="_blank" >EF16_019/0000822: CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of VISIGRAPP2023 - Volume3: IVAPP

  • ISBN

    9789897586347

  • ISSN

    2184-4321

  • e-ISSN

  • Number of pages

    8

  • Pages from-to

    179-186

  • Publisher name

    SCITEPRESS – Science and Technology Publications, Lda.

  • Place of publication

    Lisbon, Portugal

  • Event location

    Lisbon, Portugal

  • Event date

    Feb 19, 2023

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article