2019
DOI: 10.1109/tvcg.2018.2865029
|View full text |Cite
|
Sign up to set email alerts
|

Situ: Identifying and Explaining Suspicious Behavior in Networks

Abstract: Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets, and major financial damages. Anomaly detection methods are beneficial for detecting new types of attacks and abnormal network activity, but such algorithms can be difficult to understand and trust. Network operators and cyber analysts need fast and scalable tools to help identify suspicious behavior that bypasses automated se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 60 publications
(38 citation statements)
references
References 35 publications
0
35
0
Order By: Relevance
“…Data Collection [37], [47], [80], [103], [104], [107], [111], [127]- [132] Analysis & Detection [13], [35], [41], [43], [55], [56], [84], [133]- [157] Presentation [9], [12], [13], [80], [97], [99], [112], [127], [158]- [170] V-B2). As the interface between people and machines, the presentation of data and analysis results is of particular interest in a SOC context.…”
Section: Technology Referencesmentioning
confidence: 99%
See 3 more Smart Citations
“…Data Collection [37], [47], [80], [103], [104], [107], [111], [127]- [132] Analysis & Detection [13], [35], [41], [43], [55], [56], [84], [133]- [157] Presentation [9], [12], [13], [80], [97], [99], [112], [127], [158]- [170] V-B2). As the interface between people and machines, the presentation of data and analysis results is of particular interest in a SOC context.…”
Section: Technology Referencesmentioning
confidence: 99%
“…However, they also present the model visually to enable the machine learning model's decisions to be understood. The Situ platform [13] has the goal to visualize the context of an incident for leveraging the experience of security experts. In contrast to the approaches described above, the CyberCOP [12], [99], [160] platform relies on three-dimensional visualization.…”
Section: ) Presentationmentioning
confidence: 99%
See 2 more Smart Citations
“…Liao and Striegel (Liao and Striegel 2012) propose a differential anomaly visualization by reducing the granularity of network components to communities which increases network shift tolerance and scalability. Situ (Goodall et al 2019) is a visualization platform that takes in a stream of network data and performs probability-based anomaly detection before presenting information on suspicious IPs through multiple views.…”
Section: Related Workmentioning
confidence: 99%