Towards a Common Evaluation Framework for Cyber Security Visualizations

نویسندگان

  • Noëlle Rakotondravony
  • Hans P. Reiser
چکیده

With the increasing number of cyber security visualization tools, literature has repeatedly highlighted the need for a common evaluation framework to help assessing and quantifying the effectiveness of proposed tools and validate their adequacy to targeted usages. However, there is no research yet that supports the development of such framework. We present a work in progress and preliminary ideas towards building a common evaluation framework for cyber security visualizations. Many authors have contributed to the state of the art of evaluation in the field of cyber security visualization. Staheli et al. [4] systematized a taxonomy for evaluable components, which have also been derived from evaluation work in other research fields. The methodologies described by Sethi et al. [3] and Suo et al. [5] reflect the different forms of an evaluation framework for cyber security visualization and methods to address its development. Moreover, through an analysis of research works from the VizSec venue, Staheli et al. [4] highlighted that among the forms of evaluation that are included in the selected works, some dimensions and evaluation techniques (e.g., psychophysiological methods) are not yet considered. This is especially because doing so would require knowledge that is not necessarily covered by the expertise of cyber security analysts. Besides, considering a target user’s requirements as evaluation metrics, as described by Sethi et al. [3], is undoubtedly an important form of evaluation but covers only qualitative aspects. In order to build a comprehensive framework, this could also be completed with other relevant aspects such as quantitative ones.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EEVi –Framework and Guidelines to Evaluate the Effectiveness of Cyber- Security Visualization

Cyber-security visualization aims to reduce security analysts’ workload by presenting information as visual analytics instead of a string of text and characters. However, the adoption of the resultant visualizations by security analysts, is not widespread. The literature indicates a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a rea...

متن کامل

Modeling Cyber-Insurance: Towards a Unifying Framework

We propose a comprehensive formal framework to classify all market models of cyber-insurance we are aware of. The framework features a common terminology and deals with the specific properties of cyber-risk in a unified way: interdependent security, correlated risk, and information asymmetries. A survey of existing models, tabulated according to our framework, reveals a discrepancy between info...

متن کامل

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

Psychological Factors Affecting on the Culture and Awareness of Cyber Security in During of Covid-19 Outbreak

The aim of this study was to investigate the psychological factors affecting the culture and awareness of cyber security in the period of Covid-19 outbreak by qualitative method and theme analysis. Research data from upstream documents that include all valid articles published in 2020 to 2022 inside and outside the country, with 4 keywords (culture, awareness, cyber security, psychological fact...

متن کامل

Towards a Framework for Assuring Cyber Physical System Security

Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research. Many kinds of attacks arise (e.g. the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017