Anomaly detection using pattern-of-life visual metaphors

Complex dependencies exist across the technology estate, users and purposes of machines. This can make it difficult to efficiently detect attacks. Visualization to date is mainly used to communicate patterns of raw logs, or to visualize the output of detection systems. In this paper we explore a nov...

Full description

Bibliographic Details
Main Authors: Happa, J, Bashford-Rogers, T, Agrafiotis, I, Goldsmith, M, Creese, S
Format: Journal article
Published: Institute of Electrical and Electronics Engineers 2019
_version_ 1826286032085057536
author Happa, J
Bashford-Rogers, T
Agrafiotis, I
Goldsmith, M
Creese, S
author_facet Happa, J
Bashford-Rogers, T
Agrafiotis, I
Goldsmith, M
Creese, S
author_sort Happa, J
collection OXFORD
description Complex dependencies exist across the technology estate, users and purposes of machines. This can make it difficult to efficiently detect attacks. Visualization to date is mainly used to communicate patterns of raw logs, or to visualize the output of detection systems. In this paper we explore a novel approach to presenting cybersecurity-related information to analysts. Specifically, we investigate the feasibility of using visualizations to make analysts become anomaly detectors using Pattern-of-Life Visual Metaphors . Unlike glyph metaphors, the visualizations themselves (rather than any single visual variable on screen) transform complex systems into simpler ones using different mapping strategies. We postulate that such mapping strategies can yield new, meaningful ways to showing anomalies in a manner that can be easily identified by analysts. We present a classification system to describe machine and human activities on a host machine, a strategy to map machine dependencies and activities to a metaphor. We then present two examples, each with three attack scenarios, running data generated from attacks that affect confidentiality, integrity and availability of machines. Finally, we present three in-depth use-case studies to assess feasibility (i.e. can this general approach be used to detect anomalies in systems?), usability and detection abilities of our approach. Our findings suggest that our general approach is easy to use to detect anomalies in complex systems, but the type of metaphor has an impact on user’s ability to detect anomalies. Similar to other anomaly-detection techniques, false positives do exist in our general approach as well. Future work will need to investigate optimal mapping strategies, other metaphors, and examine how our approach compares to and can complement existing techniques.
first_indexed 2024-03-07T01:37:45Z
format Journal article
id oxford-uuid:95c975aa-c99e-45a9-8947-cbf7e5e7eca3
institution University of Oxford
last_indexed 2024-03-07T01:37:45Z
publishDate 2019
publisher Institute of Electrical and Electronics Engineers
record_format dspace
spelling oxford-uuid:95c975aa-c99e-45a9-8947-cbf7e5e7eca32022-03-26T23:48:31ZAnomaly detection using pattern-of-life visual metaphorsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:95c975aa-c99e-45a9-8947-cbf7e5e7eca3Symplectic Elements at OxfordInstitute of Electrical and Electronics Engineers2019Happa, JBashford-Rogers, TAgrafiotis, IGoldsmith, MCreese, SComplex dependencies exist across the technology estate, users and purposes of machines. This can make it difficult to efficiently detect attacks. Visualization to date is mainly used to communicate patterns of raw logs, or to visualize the output of detection systems. In this paper we explore a novel approach to presenting cybersecurity-related information to analysts. Specifically, we investigate the feasibility of using visualizations to make analysts become anomaly detectors using Pattern-of-Life Visual Metaphors . Unlike glyph metaphors, the visualizations themselves (rather than any single visual variable on screen) transform complex systems into simpler ones using different mapping strategies. We postulate that such mapping strategies can yield new, meaningful ways to showing anomalies in a manner that can be easily identified by analysts. We present a classification system to describe machine and human activities on a host machine, a strategy to map machine dependencies and activities to a metaphor. We then present two examples, each with three attack scenarios, running data generated from attacks that affect confidentiality, integrity and availability of machines. Finally, we present three in-depth use-case studies to assess feasibility (i.e. can this general approach be used to detect anomalies in systems?), usability and detection abilities of our approach. Our findings suggest that our general approach is easy to use to detect anomalies in complex systems, but the type of metaphor has an impact on user’s ability to detect anomalies. Similar to other anomaly-detection techniques, false positives do exist in our general approach as well. Future work will need to investigate optimal mapping strategies, other metaphors, and examine how our approach compares to and can complement existing techniques.
spellingShingle Happa, J
Bashford-Rogers, T
Agrafiotis, I
Goldsmith, M
Creese, S
Anomaly detection using pattern-of-life visual metaphors
title Anomaly detection using pattern-of-life visual metaphors
title_full Anomaly detection using pattern-of-life visual metaphors
title_fullStr Anomaly detection using pattern-of-life visual metaphors
title_full_unstemmed Anomaly detection using pattern-of-life visual metaphors
title_short Anomaly detection using pattern-of-life visual metaphors
title_sort anomaly detection using pattern of life visual metaphors
work_keys_str_mv AT happaj anomalydetectionusingpatternoflifevisualmetaphors
AT bashfordrogerst anomalydetectionusingpatternoflifevisualmetaphors
AT agrafiotisi anomalydetectionusingpatternoflifevisualmetaphors
AT goldsmithm anomalydetectionusingpatternoflifevisualmetaphors
AT creeses anomalydetectionusingpatternoflifevisualmetaphors