Cargando…

Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study

Employees who have legitimate access to an organization's data may occasionally put sensitive corporate data at risk, either carelessly or maliciously. Ideally, potential breaches should be detected as soon as they occur, but in practice there may be delays, because human analysts are not able...

Descripción completa

Detalles Bibliográficos
Autores principales: Chung, Mu-Huan (Miles), Yang, Yuhong (Alisha), Wang, Lu, Cento, Greg, Jerath, Khilan, Taank, Parwinder, Raman, Abhay, Chan, Jonathan H., Chignell, Mark H.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9938479/
https://www.ncbi.nlm.nih.gov/pubmed/36820176
http://dx.doi.org/10.1016/j.heliyon.2023.e13025
_version_ 1784890640746676224
author Chung, Mu-Huan (Miles)
Yang, Yuhong (Alisha)
Wang, Lu
Cento, Greg
Jerath, Khilan
Taank, Parwinder
Raman, Abhay
Chan, Jonathan H.
Chignell, Mark H.
author_facet Chung, Mu-Huan (Miles)
Yang, Yuhong (Alisha)
Wang, Lu
Cento, Greg
Jerath, Khilan
Taank, Parwinder
Raman, Abhay
Chan, Jonathan H.
Chignell, Mark H.
author_sort Chung, Mu-Huan (Miles)
collection PubMed
description Employees who have legitimate access to an organization's data may occasionally put sensitive corporate data at risk, either carelessly or maliciously. Ideally, potential breaches should be detected as soon as they occur, but in practice there may be delays, because human analysts are not able to recognize data exfiltration behaviors quickly enough with the tools available to them. Visualization may improve cybersecurity situation awareness. In this paper, we present a dashboard application for investigating file activity, as a way to improve situation awareness. We developed this dashboard for a wide range of stakeholders within a large financial services company. Cybersecurity experts/analysts, data owners, team leaders/managers, high level administrators, and other investigators all provided input to its design. The use of a co-design approach helped to create trust between users and the new visualization tools, which were built to be compatible with existing work processes. We discuss the user-centered design process that informed the development of the dashboard, and the functionality of its three inter-operable monitoring dashboards. In this case three dashboards were developed covering high-level overview, file volume/type comparison, and individual activity, but the appropriate number and type of dashboards to use will likely vary according to the nature of the detection task). We also present two use cases with usability results and preliminary usage data. The results presented examined the amount of use that the dashboards received as well as measures obtained using the Technology Acceptance Model (TAM). We also report user comments about the dashboards and how to improve them.
format Online
Article
Text
id pubmed-9938479
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-99384792023-02-19 Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study Chung, Mu-Huan (Miles) Yang, Yuhong (Alisha) Wang, Lu Cento, Greg Jerath, Khilan Taank, Parwinder Raman, Abhay Chan, Jonathan H. Chignell, Mark H. Heliyon Research Article Employees who have legitimate access to an organization's data may occasionally put sensitive corporate data at risk, either carelessly or maliciously. Ideally, potential breaches should be detected as soon as they occur, but in practice there may be delays, because human analysts are not able to recognize data exfiltration behaviors quickly enough with the tools available to them. Visualization may improve cybersecurity situation awareness. In this paper, we present a dashboard application for investigating file activity, as a way to improve situation awareness. We developed this dashboard for a wide range of stakeholders within a large financial services company. Cybersecurity experts/analysts, data owners, team leaders/managers, high level administrators, and other investigators all provided input to its design. The use of a co-design approach helped to create trust between users and the new visualization tools, which were built to be compatible with existing work processes. We discuss the user-centered design process that informed the development of the dashboard, and the functionality of its three inter-operable monitoring dashboards. In this case three dashboards were developed covering high-level overview, file volume/type comparison, and individual activity, but the appropriate number and type of dashboards to use will likely vary according to the nature of the detection task). We also present two use cases with usability results and preliminary usage data. The results presented examined the amount of use that the dashboards received as well as measures obtained using the Technology Acceptance Model (TAM). We also report user comments about the dashboards and how to improve them. Elsevier 2023-01-16 /pmc/articles/PMC9938479/ /pubmed/36820176 http://dx.doi.org/10.1016/j.heliyon.2023.e13025 Text en © 2023 The Authors. Published by Elsevier Ltd. https://creativecommons.org/licenses/by-nc-nd/4.0/This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
spellingShingle Research Article
Chung, Mu-Huan (Miles)
Yang, Yuhong (Alisha)
Wang, Lu
Cento, Greg
Jerath, Khilan
Taank, Parwinder
Raman, Abhay
Chan, Jonathan H.
Chignell, Mark H.
Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study
title Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study
title_full Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study
title_fullStr Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study
title_full_unstemmed Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study
title_short Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study
title_sort enhancing cybersecurity situation awareness through visualization: a usb data exfiltration case study
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9938479/
https://www.ncbi.nlm.nih.gov/pubmed/36820176
http://dx.doi.org/10.1016/j.heliyon.2023.e13025
work_keys_str_mv AT chungmuhuanmiles enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy
AT yangyuhongalisha enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy
AT wanglu enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy
AT centogreg enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy
AT jerathkhilan enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy
AT taankparwinder enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy
AT ramanabhay enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy
AT chanjonathanh enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy
AT chignellmarkh enhancingcybersecuritysituationawarenessthroughvisualizationausbdataexfiltrationcasestudy