Conference PaperPDF Available

Choosing Models for Security Metrics Visualization

Authors:

Abstract and Figures

This paper aims at finding optimal visualization models for representation and analysis of security related data, for example, security metrics, security incidents and cyber attack countermeasures. The classification of the most important security metrics and their characteristics that are important for their visualization are considered. The paper reviews existing and suggested research by the author’s data representation and visualization models. In addition, the most suitable models for different metric groups are outlined and analyzed. A case study is presented as an illustration on the way the visualization models are integrated with different metrics for security awareness.
Content may be subject to copyright.
Jacek Rak · John Bay · Igor Kotenko
Leonard Popyack · Victor Skormin
Krzysztof Szczypiorski (Eds.)
123
LNCS 10446
7th International Conference
on Mathematical Methods, Models, and Architectures
for Computer Network Security, MMM-ACNS 2017
Warsaw, Poland, August 28–30, 2017, Proceedings
Computer
Network Security
Jacek Rak John Bay Igor Kotenko
Leonard Popyack Victor Skormin
Krzysztof Szczypiorski (Eds.)
Computer
Network Security
7th International Conference
on Mathematical Methods, Models, and Architectures
for Computer Network Security, MMM-ACNS 2017
Warsaw, Poland, August 2830, 2017
Proceedings
123
Editors
Jacek Rak
Gdansk University of Technology
Gdansk
Poland
John Bay
Binghamton University
Binghamton, NY
USA
Igor Kotenko
St. Petersburg Institute
for Informatics and Automation
St. Petersburg
Russia
Leonard Popyack
Utica College
Utica, NY
USA
Victor Skormin
Binghamton University
Binghamton, NY
USA
Krzysztof Szczypiorski
Warsaw University of Technology
Warsaw
Poland
ISSN 0302-9743 ISSN 1611-3349 (electronic)
Lecture Notes in Computer Science
ISBN 978-3-319-65126-2 ISBN 978-3-319-65127-9 (eBook)
DOI 10.1007/978-3-319-65127-9
Library of Congress Control Number: 2017948184
LNCS Sublibrary: SL5 Computer Communication Networks and Telecommunications
©Springer International Publishing AG 2017
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microlms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specic statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional afliations.
Printed on acid-free paper
This Springer imprint is published by Springer Nature
The registered company is Springer International Publishing AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Choosing Models for Security Metrics
Visualization
Maxim Kolomeec
1,3
, Gustavo Gonzalez-Granadillo
2
,
Elena Doynikova
1,3
, Andrey Chechulin
1,3
, Igor Kotenko
1,3(&)
,
and HervéDebar
2
1
St. Petersburg Institute for Informatics and Automation of the Russian
Academy of Sciences (SPIIRAS), 39, 14 Liniya, St. Petersburg, Russia
{kolomeec,doynikova,chechulin,ivkote}@comsec.spb.ru
2
Institut Mines-Télécom, Télécom SudParis, CNRS UMR 5157 SAMOVAR,
Evry, France
pci_gustavo@yahoo.com,
herve.debar@telecom-sudparis.eu
3
St. Petersburg National Research University of Information Technologies,
Mechanics and Optics, 49, Kronverkskiy Prospekt, Saint-Petersburg, Russia
Abstract. This paper aims at nding optimal visualization models for repre-
sentation and analysis of security related data, for example, security metrics,
security incidents and cyber attack countermeasures. The classication of the
most important security metrics and their characteristics that are important for
their visualization are considered. The paper reviews existing and suggested
research by the authors data representation and visualization models. In addi-
tion, the most suitable models for different metric groups are outlined and
analyzed. A case study is presented as an illustration on the way the visual-
ization models are integrated with different metrics for security awareness.
Keywords: Visualization model !Security metrics !Cost-sensitive metrics !
Countermeasure selection !Security assessment
1 Introduction
Nowadays, cyber security situational awareness and countermeasure selection become
more and more relevant as soon as cyber technology becomes an essential part of our
life. The appropriate mitigation of a given attack depends on the optimal selection of
security countermeasures. In order to select a countermeasure, it is important to identify
its attributes and properties as well as the consequences of its application. A great
number of researches propose cost-sensitive models [1,2] including various security
metrics to evaluate threats and select security countermeasures. However, due to the
complexity and sophistication of current attacks, the detection and reaction process
requires additional tools to help security analysts in the decision making process.
Approaches in this domain propose visualization models (e.g., graphical models
[3,4], and geometrical models [5,6]) to estimate and analyze the impact of cyber
events, making it possible to represent graphically scenarios of multiple attacks and to
©Springer International Publishing AG 2017
J. Rak et al. (Eds.): MMM-ACNS 2017, LNCS 10446, pp. 7587, 2017.
DOI: 10.1007/978-3-319-65127-9_7
select optimal countermeasures accordingly. However, the main issue faced nowadays
is to be able to select the appropriate model for the studied scenario.
In this paper, we propose to analyze security metrics and visualization models with
the aim of obtaining conclusions on the best match among them in order to help
operators in the security monitoring and selection of security countermeasures against
a given attack scenario.
The rest of the paper is structured as follows: Sect. 2introduces the different types
of metrics used for the security assessment and countermeasure selection. Section 3
presents the geometrical and graphical models used for the visualization of security
events. Section 4discusses the complexity and usefulness of visualization models.
Section 5describes visualization tools that implement suggested models, and provides
a case study to illustrate the applicability of our approach. Related works are presented
in Sect. 6. Finally, conclusions are presented in Sect. 7.
2 Metrics for the Security Assessment
Currently there are a lot of metrics for the security assessment and countermeasure
selection [1,2,712]. These metrics can be classied according to the object of
assessment. There are metrics that characterize networks, cyber attacks, attackers,
security incidents, and integral metrics that characterize common security level of the
analyzed system and that are used for the countermeasure selection [4,13]. These
objects can be compound (like network and attack) or not (like security incidents,
attackers and countermeasures). In addition, all these objects interact in the process of
security assessment and countermeasure selection that lead to the connections between
some groups of metrics (when the metrics of the next group are calculated using the
metrics of the previous group) and to the appearance of new metrics.
Network incorporates interconnected hosts, network hardware and services, hosts
include different software. Software and hardware, in its turn, include vulnerabilities and
weak places. From the security assessment point of view, for instance, the next examples
of metrics can be outlined: the metrics that characterize a network Percentage of Hosts
without Known Severe Vulnerabilities [12]; the metrics that characterize hosts and
software/hardware Criticality, Business Value; the metrics that characterize vulnera-
bilities Exploitability, Impact [11].
We consider an attack as a sequence of attack actions that exploit network vul-
nerabilities. From the attack and attack action point of view the next metrics can be
outlined: Severity, Complexity, Impact, and Probability. Metrics of this group are
calculated using metrics of the previous network group. In addition, new knowledge on
the possible attacks allows getting new metrics for the network objects, for example,
Number of Attacks through the Host [4,13].
We consider security incident as a product of events correlation process. The
following metrics that characterize security incidents can be outlined: Severity, Con-
dence Level [4,13]. New knowledge on the security incidents allows getting new
metrics for the network and its objects, for example, Number of Incidents, Number of
Compromised Hosts. It also allows rening metrics of the attacker group, for example,
76 M. Kolomeec et al.
current position in the network and skills, and attack group, for example, Attack
Probability [4,13,14].
The main metrics that characterize countermeasures are: Countermeasure Ef-
ciency, Collateral Damage Potential, and Countermeasure Cost. Integral metrics that
are used to dene common security level include: Risk, Attack Surface [9,10], and
Expected Losses [15]. For the countermeasure selection, cost sensitive metrics are
used. Cost sensitive metrics are widely proposed as a viable approach to nd an
optimal balance between intrusion damages and response costs, and to guarantee the
choice of the most appropriate response without sacricing the system functionalities.
The Net Present Value (NPV) allows discounting all expected costs and benets
from an investment to its present value, taking into account the time value of money.
The Internal Rate of Return (IRR) considers the compounded annual rate of return the
project is expected to generate. The ROI index compares the benets versus the costs
obtained for a given investment [1]. The Return On Security Investment (ROSI) is
a relative metric that compares the differences between the damages originated by
attacks (with and without countermeasures) against the cost of the countermeasure. The
Return On Response Investment (RORI) provides a qualitative comparison of response
candidates against an intrusion by considering response collateral damages response
effects on intrusions [7].
3 Visualization Approaches
The current state of the art in visualization tools propose a wide range of models. It is
suggested to select conditionally two kind of visualization models: geometrical models
[5,6] and graphical models [3,4], to estimate the impact of cyber security events and
to select countermeasures accordingly. The rest of the section details such models.
3.1 Geometrical Models
This section presents the different visualization models that use geometry as a tool to
compute the impact of cyber attacks and security countermeasures within an infor-
mation system.
We have proposed a polygonal model to calculate the impact of cyber events in
a 2-dimensional system. The approach considers information about all entities com-
posing an information system (e.g., users, IP addresses, communication protocols,
physical and logical resources, etc.), as well as contextual information (e.g., temporal,
spatial, historical conditions) to plot cyber attacks and countermeasures as polygons of
n sides. A variety of geometrical instances (e.g., regular and irregular polygons such as:
line segments, triangles, squares, pentagons, etc.) results from the analysis of the
entitiesinformation included in a system, attack and/or countermeasure [16].
Each side of the polygon is computed as the contribution of the entity in the
execution of an event. The contribution for the user account dimension, for instance,
can be evaluated as the number of users affected by a given attack over the total number
of active users from the system. Following the CARVER methodology [17], which
Choosing Models for Security Metrics Visualization 77
considers six criteria (i.e., criticality, accessibility, recuperability, vulnerability, effect,
recognizability), we assign numerical values on a scale of 1 to 10 to each type of
elements within the axis. As a result, we obtain a weighting factor (WF) that is
associated to each type of elements. Examples of visualization of attacks and coun-
termeasures in the polygonal system are shown in Fig. 1.
Three-dimensional model allows to compute the volume of an information sys-
tem, an attack and/or a countermeasure or a group of them. We identied three main
dimensions that contribute directly to the execution of a given attack: User account
(subject), Resource (object), and Channel (the way to execute actions, e.g., connect,
read, write, etc.) [6]. The projection of the three axis in our coordinate system generates
a parallelepiped in three dimensions. The volume of this parallelepiped is equal to the
absolute value of the scalar triple product of all three vectors. The volume calculation
requires the computation of the contribution of each axis represented in the coordinate
system. This contribution is determined as the sum of each set of axis entities (e.g., user
account type, port class, resource type) times its associated weighting factor. Examples
of visualization of attacks and countermeasures in a 3D system are shown in Fig. 1.
(a) Triangle (b) Rhombus (c) Pentagon (d) Octagon
(i) Trian
g
ular Prism (j) Prism (k) Octa
g
onal Prism (l) Multi
p
le Prisms
(e) Single
Volume
(f) Partially Joint
Volumes
(g) Totally Joint
Volumes
(h) Multiple
Volumes
Fig. 1. Geometrical Models
78 M. Kolomeec et al.
A prismatic model is proposed to represent cyber security events (e.g., attacks,
countermeasures) as prismatic instances of n-sides. The base of the prism integrates the
information from the targets side (internal entities), whereas the height of the prism
integrates the information from the attackers side (external entities). The approach
considers information about all entities composing an information system and the
attackers information (e.g., knowledge, motivation, skills, etc.), to plot cyber attacks
and countermeasures in a geometrical system. The ultimate goal of our model is to help
organizations make the most cost-effective decisions in minimizing the risk of the
studied cyber events [18]. A variety of geometrical instances (e.g., regular and irregular
prisms) results from the analysis of the internal and external information related to a
given cyber security event. Examples of visualization of attacks and countermeasures
in an N-Prismatic system are shown in Fig. 1.
3.2 Graphical Models
Graphical models are based on elements of Visual Grammar [19] such as abstract
objects (dot, line, plane, demission, format), abstract structures (basic, formal, grada-
tion, concentric radial, centrifugal and not-formal structures), specic objects (shape,
size, color, tone, saturation, opacity), acts (repeat, mirror reection, rotation, scaling,
movement, offset) and relationships (attraction, symmetry, balance, cluster, diffusion,
domination, variation, overlay). The combinations of these elements create different
graphical models, that user can simply interpret.
Graphical models can be classied by different ways, but the simplest classication
is separation on numerical models graphics that can visualize data objects; and not
numerical models graphics that can visualize data objects and links between them.
The basic examples of numerical models are: charts [20] (Fig. 2a) data visualized
using specic objects as lines, areas, color and other; parallel coordinates [20] (Fig. 2b)
data are represented as polylines that crossing the metric scales; trilinear coordinates
[20] (Fig. 2c) models in which objects are situated in trilinear coordinates; wind roses
[20] (Fig. 2d) modes where data represented as polylines (like in a parallel coordi-
nates) that crossing the metric scales, but scales located as radial structure; interval
graphs [20] (Fig. 2e) processes are represented as lines or arcs, where their overlay on
specic axes represents the concurrent execution of processes.
The basic not numerical models are: graphs [20] (Fig. 2)models where objects
are represented as vertexes and links as edges; matrices [20] (Fig. 2)objects are
represented as axes and links as their crossing; treemaps [20] (Fig. 2)hierarchical
models where objects are visualized as areas and links as object placement (if objects
are linked, they are located in each other); graphs with glyphs [20] (Fig. 2)graph
models in which vertexes are replaced by the stacked pie-charts for possibility of
placement more metrics of objects; Voronoi diagrams [3] (Fig. 2)models where
objects are represented as polygons and links as tiny lines between the polygons;
Chord diagrams [21] (Fig. 2)objects are represented as donate chart and links as
edges between chart`s pieces; geo-maps [20] (Fig. 2)models in which other models
overlapping on geographical maps.
Choosing Models for Security Metrics Visualization 79
Above mentioned models have different advantages that depend on the use of
metrics for model construction and of the context in which the model is used.
4 Complexity and Usefulness of Visualization Models
It is important to understand that there is no universal visualization model that can
represent all stages of risk analysis process. That is why analytics usually use slices of
data. Such slices have different properties, for example: dependencies of services have
topology of links, events sequences are structured by time, network and its segments
have hierarchy, and countermeasures have no links or dependencies (if they do not
represent a connected set of different countermeasures).
At the same time, each model can describe only few sets of metrics: for example,
2D linear charts have 2 axes, line thickness, color and opacity; and some analytics
trying to combine or create new visualization models that can contain more metrics
especially for selected slice. Therefore it is not trivial to choose or create appropriate
visualization models. To understand how to choose model for data slices we propose
the methodology that choose a visualization model or hierarchically create a model
depending on the properties of slice. This methodology includes 4 simple steps:
(1) data slicing, (2) denition of set of models, (3) generation of a set of new models
and (4) model choosing from the set.
Step 1 data slicing. Depending on the risk analysis goal we need to select the
data subset slice. Typical case that can become a problem is when the data set
(a) Chart (b) Parallel coordi-
nates
(c) Trilinear coor-
dinates
(d) Wind rose
(e) Interval graph (f) Graph (g) Matrix (h) Treemap
(i) Graph with glyphs (j) Voronoi
diagram (k) Chord diagram (l) Geo-maps
Fig. 2. Graphical models
80 M. Kolomeec et al.
consists of too many objects (example: host with 50 attributes) or data set is deeply
nested (example: data represent networks that contain hosts with software vulnerabil-
ities). If we try to visualize this set, we will obtain a complex image. That is why it is
strongly recommended to minimize the set structure to few necessary attributes and
nesting levels using data aggregation. Data aggregation is a complex standalone task,
and it will be considered in future works.
Step 2 denition of a set of models. At this step we associate data slice with
visualization models. To do this, we have to select the attributes of the slice. The set of
basic attributes that we can determine is a more detailed description of numericaland
not numericaldata classication:
Not linked the slice that can be described as an object or independent list of
objects characterized by numerical data. For example: list of vulnerabilities,
aggregated parameters of network, attacker parameters.
Not structured linked the slice that contains dependent data. The basic example is
the network topology.
Planar linked the slice that contains dependent data that can be represented as a
planar graph. The basic example is the network topology on the physical level.
Hierarchy linked the slice that contains dependent data that can be represented as
a tree. An example an attack tree.
Multiply linked the slice that contains dependent data with different types of links.
For example, a network topology (not structured links) including an attack tree
(hierarchy linked).
Examples of association with models from Sect. 3are shown in Table 1.
Step 3 generation of a set of new models. It is absolutely possible that data in
the selected slice are deeply nested. The simple example of this case is the slice that
contains 3 nested sets: hosts with the network topology, software on the hosts that
depend on each other, independent software vulnerabilities.
Each of these nested sets represents different level of abstraction. We can try to
visualize all levels at the same time in one visualization model, but it is possible that
Table 1. Association of data slice attributes with models
Data slice attributes Model
Not linked All geometrical models, charts, parallel coordinates, trilinear
coordinates, wind roses, interval graphs
Linked Not
structured
Graphs, glyphs, matrices
Planar
structured
Graphs, glyphs, matrices, Voronoi diagrams,
Hierarchy
structured
Graphs, glyphs, matrices, treemaps
Multiply
structured
Graphs, glyphs, matrices, Chord diagrams
Choosing Models for Security Metrics Visualization 81
results will be difcult to read. Another approach is to visualize each abstraction level
on demand, for example, to expand a host by a click, but in this case we will not see the
whole data at the same time. Another approach is to create a specic visualization
model for the selected slice.
The basic way of the model creation is the hierarchical visualization, where every
abstract level is a single visualization model. According to this, we have to separate the
slice by abstraction levels.
For example, slice for denition of the impact propagation via service dependences
can be separated on two abstract levels: (1) high level services and their dependencies
with weights; (2) low level service characteristics (intrinsic criticality and vulnera-
bility level). For every abstraction level we select the model according the association
between properties and models (see Table 1). Results for a given example are shown in
Table 2. Finally, the model of low level overlaps with the elements of the model of
high level. Examples are graphs with glyphs (Fig. 2), in which glyphs overlap with
graph nodes, and geo-maps, in which graphs overlap with geographical maps (Fig. 2).
Step 4 - Model choosing from the set. At the last step we have the set of the
models that we selected at step 2 and the models that we created at step 3. It is always
better to choose models that can be easy readable and have no external dimensions. It is
also common to nd a situation when a nal set contains only hard readable models. It
means that the selected slice has many abstraction levels or too many data dimensions.
The best solution is to reduce selected data slice and go to step 1.
5 Implementation and Verication of the Approach
Implementation. Data visualization models were developed as a web-application
prototype that was implemented on JavaScript using Node.js on server side, and D3.js
with THREE.js on client side. Software architecture is pretty similar to visualization
pipeline [22] and it is shown in Fig. 3.
Table 2. Abstraction levels of the slice
Abstraction
level
Data description Properties Model
High Services and their
dependencies with
weights
Not
structured
Graphs, glyphs, matrices
Low Services
characteristics
Not
linked
All geometrical models, charts, parallel
coordinates, trilinear coordinates, wind
roses, interval graphs
Fig. 3. Software architecture
82 M. Kolomeec et al.
Using the application we can load metrics and other data as CSV les. There is
a possibility to load 2 types of CSV: (1) le with objects and (2) le with links.
Numerical models need only le with objects, not numerical both of them. After that
we can simply connect graphical attributes of the models (size, color, dimensions, etc.)
with attributes from CSV. As a result, we can visualize data using models in different
ways and select the most easy-readable variant.
Case study. For case study we present a small corporative network with the following
metrics and network attributes:
Host attributes number of software instances, number of services, number of
ports, performance rate, type of device, number of users, date of update, number of
incidents, medium severity of incidents, number of vulnerabilities, vulnerability,
compromising status, number of attacks, probability of attack, criticality.
Links attributes type of connection (optical ber, wi-, etc.), level of connection
according to OSI model, trafc volume, noise immunity, channel capacity, status of
participation in the attack, number of attacks, criticality.
Hosts and links of physical level were visualized by the web-application prototype
to show the network topology. The result is shown in Fig. 4: network contains hosts of
different types (see Table 3). For visualization approach verication we provide two
examples. The rst example is URL rewriting. The second example presents the
visualization of the computer network risks and attack routes for situational awareness.
Example 1. Example of geometrical visualization URL Rewriting. The general
process starts when the attack (e.g., A3) accesses the URL of an external web appli-
cation and studies its behavior, and then the attacker rewrites the URL of the web
application to bypass any implemented security check (login, cookies, session). As
a result, the attacker bypasses security checks and accesses restricted information.
Fig. 4. Physical network topology
(Color gure online)
Table 3. Network structure
external network
user PC router
wi-fi mobile device
firewall data base
virtualization server virtual machine
Choosing Models for Security Metrics Visualization 83
Examples of countermeasures associated to attack A3 are: Deny or redirect requests
(C6); Disable URL-rewriting mode (C7); and Activate automatic expiring URLs (C8).
The graphical representation of each countermeasure vs. the detected attacks is
depicted in Fig. 5, where the blue parallelepiped represents attack A3 and the green
parallelepiped represents the countermeasures based on the affected users, resources
and channels.
Example 2.
Step 1. For situational awareness we select the next data slice from network attributes:
host attributes medium severity of incidents, compromising status, number
of attacks, probability of attack, risk; links attributes network level of
connection, status of participation in attack, number of attacks, criticality.
Step 2. According to Table 1the slice is classied as multiply structuredbecause
network level of connections can be represented as a fully connected graph
and we need to visualize the attackers route. According to Table 1the pos-
sible models are: graphs, glyphs, matrices, chord diagrams. If we use graphs,
the nal model will be hard to read because some edges must represent
network connections and some edges attacker`s route. As a result users
cannot effectively make out different types of edges. The rest of models cannot
represent not -structured connections and attackers route at the same time and
we need to create a specic visualization model.
Step 3. For hierarchical visualization we need to divide slices on different levels of
abstraction (see Table 4).
Our decision (Fig. 6) is to visualize high level as matrix, medium level as graph,
and low level as glyphs. Hosts are shown as diagonal glyphs, links as glyphs above
the diagonal. Hosts glyphs consist of 4 parts: criticality (top-left), probability
(top-right), risk (bottom-left) and number of vulnerabilities (bottom-right). Links
glyph has 2 parts: criticality (top) and probability (bottom). The network that was
provided in the case study is shown in Fig. 4at the left side and the network with
attacker route (internet > router >rewall > router > database) is shown at the
right side. The numerical parameters were normalized to values between zero and one
are represented with blue, yellow, orange and red colors.
Fig. 5. Example of geometrical visualization of the attack and the countermeasure
84 M. Kolomeec et al.
6 Related Work
Current researches focus on simulation and visualization models as a tool to improve
the evaluation and selection of security countermeasures. Dini and Tiloca [8], propose
a simulation framework that evaluates the impact of cyber-physical attacks. However,
countermeasures are not considered in the evaluation process.
Kundur et al. [23], propose a paradigm for cyber attack impact analysis that employs
a graph-theoretic structure and a dynamical systems framework to model the complex
interactions amongst the various system components. The approach concentrates on the
attack impact but leaves aside the impact of mitigation actions in the evaluation. Duan
and Cleand-Huang [24] consider heuristic methods and genetic algorithm approaches
for the process of selecting a set of countermeasures. However, due to complexity of the
search space, the heuristic approach is neither optimal, nor complete. Howard et al. [9]
and Manadhata et al. [10] propose a model that measures quantitatively the level of
exposure of a given system called the attack surface model. This latter is limited to the
source code of the software to compare the risk level among similar options.
Table 4. Abstraction levels of the slice
Abstraction
level
Data
description
Properties Model
High Hosts and
links
Not
structured
Graphs, glyphs, matrices
Medium Attacker`s
route
Not
structured
Graphs, glyphs, matrices
Low Host and
links
attributes
Not
linked
All geometrical models, charts, parallel
coordinates, trilinear coordinates, wind roses,
interval graphs
Fig. 6. Matrices with glyphs
Choosing Models for Security Metrics Visualization 85
7 Conclusions
In this paper we presented a review and analysis of existing and suggested research on
data representation and visualization models. We outline the most suitable models for
different metric groups (including security and cost sensitive metrics) to match with
geometrical and graphical visualization models. The methodology that was suggested
in the paper can be used for selection and creation of new visualization models for
different stages of risk analysis. We also proposed the case study and examples of
metrics visualization. The future works will be focused on research of user cognition
for efciency analysis and optimal ways for metrics representation.
Acknowledgements. This research is being supported by the grant of RSF #15-11-30029 in
SPIIRAS.
References
1. Schmidt, M.: Return on Investment (ROI): Meaning and Use. Encyclopedia of Business
Terms and Methods (2011). http://www.solutionmatrix.com/return-on-investment.html
2. Sonnenreich, W., Albanese, J., Stout, B.: Return on security Investment (ROSI) a practical
quantitative model. J. Res. Pract. Inf. Technol. 38(1), 4556 (2006)
3. Kolomeets, M., Chechulin, A., Kotenko, I.: Visualization model for monitoring of computer
networks security based on the analogue of voronoi diagrams. In: International
Cross-Domain Conference, and Workshop on Privacy Aware Machine Learning for Health
Data Science (2016)
4. Doynikova, E., Kotenko, I.: Countermeasure selection based on the attack and service
dependency graphs for security incident management. In: Lambrinoudakis, C., Gabillon, A.
(eds.) CRiSIS 2015. LNCS, vol. 9572, pp. 107124. Springer, Cham (2016). doi:10.1007/
978-3-319-31811-0_7
5. Gonzalez Granadillo, G., Garcia-Alfaro, J., Debar, H.: Using a 3D geometrical model to
improve accuracy in the evaluation and selection of countermeasures against complex cyber
attacks. In: Security and Privacy in Communication Networks, pp. 2629 (2015)
6. Gonzalez Granadillo, G., Alvarez, E., El-Barbori, M., Garcia-Alfaro, J., Debar, H.: Selecting
optimal countermeasures for attacks against critical systems using the Attack Volume model
and the RORI index. J. Comput. Electr. Eng. 1334 (2015)
7. Kheir, N., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: A service dependency model for
cost-sensitive intrusion response. In: 15th European Symposium on Research in Computer
Security (ESORICS), pp. 626642 (2010)
8. Dini, G., Tiloca, M.: A simulation tool for evaluating attack impact in cyber physical
systems. In: International Workshop Modelling and Simulation for Autonomous Systems,
pp. 7794 (2014)
9. Howard, M., Wing, J.: Measuring relative attack surfaces. In: Computer Security in the 21st
Century, pp. 109137 (2005)
10. Manadhata, P., Wing, J.: An attack surface metric. J. IEEE Trans. Softw. Eng. 37(3), 371
386 (2011)
86 M. Kolomeec et al.
11. Mell, P., Scarforne, K., Romanosky, S.: A complete guide to the common vulnerability
scoring system (CVSS) version 2.0. In: FIRST-Forum of Incident Response and Security
Teams, p. 23 (2007)
12. The Center for Internet Security. The CIS Security Metrics, 175 p. (2009)
13. Kotenko, I.V., Doynikova, E.: Dynamical calculation of security metrics for countermeasure
selection in computer networks. In: 24th Euromicro International Conference on Parallel,
Distributed and network-based Processing (PDP 2016), pp. 558565. IEEE Computer
Society, Los Alamitos (2016)
14. Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack
graphs. NIST Interagency Report 7788, Gaithersburg: National Institute of Standards and
Technology, 24 p. (2011)
15. Puangsri, P.: Quantied return on information security investment - a model for cost-benet
analysis. Master Thesis, Delft University of Technology (2009)
16. Gonzalez Granadillo, G., Garcia-Alfaro, J., Debar, H.: An n-sided polygonal model to
calculate the impact of cyber security events. In: International Conference on Risks and
Security of Internet and Systems (2016)
17. Special operations forces intelligence and electronic warfare operations, appendix D: Target
analysis process, Federation of American Scientists (1991). http://www.fas.org/irp/doddir/
army/fm34-36/appd.htm
18. Gonzalez Granadillo, G., Rubio-Hernan, J., Garcia-Alfaro, J., Debar, H.: Considering
internal vulnerabilities and the attackers knowledge to model the impact of cyber events as
geometrical prisms. In: Conference on Trust, Security and Privacy in Computing and
Communications (2016)
19. Leborg, C.: Visual Grammar, 1st edn, p. 96. Princeton Architectural Press, New York (2006)
20. Kolomeec, M.V., Chechulin, A.A., Kotenko, I.V.: Methodological primitives for phased
construction of data visualization models. J. Internet Serv. Inf. Secur. (JISIS) 5(4), 6084
(2015)
21. Holten, D.: Hierarchical edge bundles: visualization of adjacency relations in hierarchical
data. IEEE Trans. Vis. Comput. Graph. 12(5) (2006)
22. Haber, R.B., McNabb, D.A.: Visualization idioms: a conceptual model for scientic
visualization systems. In: Visualization in Scientic Computing, pp. 7493. IEEE Computer
Society Press (1990)
23. Kundur, D., Feng, X., Liu, S., Zourntos, T., Butler-Purry, K.L.: Towards a framework for
cyber attack impact analysis of the electric smart grid. In: International Conference on Smart
Grid Communications, pp. 244249 (2010)
24. Duan, C., Cleland-Huang, J.: Automated safeguard selection strategies. In: CTI Research
Symposium (2006)
Choosing Models for Security Metrics Visualization 87
... Separately, visualization models can be distinguished. These are formed by linking other models [64]. Such models rely on the structuring of a data set, highlighting the layers of data into a hierarchy. ...
Article
Full-text available
Currently, the methods and means of human–machine interaction and visualization as its integral part are being increasingly developed. In various fields of scientific knowledge and technology, there is a need to find and select the most effective visualization models for various types of data, as well as to develop automation tools for the process of choosing the best visualization model for a specific case. There are many data visualization tools in various application fields, but at the same time, the main difficulty lies in presenting data of an interconnected (node-link) structure, i.e., networks. Typically, a lot of software means use graphs as the most straightforward and versatile models. To facilitate visual analysis, researchers are developing ways to arrange graph elements to make comparing, searching, and navigating data easier. However, in addition to graphs, there are many other visualization models that are less versatile but have the potential to expand the capabilities of the analyst and provide alternative solutions. In this work, we collected a variety of visualization models, which we call alternative models, to demonstrate how different concepts of information representation can be realized. We believe that adapting these models to improve the means of human–machine interaction will help analysts make significant progress in solving the problems researchers face when working with graphs.
... Using matrices one can analyze small graphs with a large number of links. It is also possible to use more specific models, for example: combined models [6], models based on Voronoi maps [7] in the case of planar graphs and Voronoi TreeMaps [8] as an alternative to the TreesMaps, Chord diagrams and geo-map models. The list of possible models can be continued [5]. ...
Conference Paper
Full-text available
The paper proposes a data visualizing technique for analyzing social networks in order to identify and counteract inappropriate, dubious and harmful information. The proposed technique is based on the force-layout technique of drawing graphs in which the parameters of vertices and edges are calculated depending on the number of links. The paper provides an example of using the proposed data visualization technique for social networks analysis on the basis of visual analytics of several groups in the "VKontakte" social network in four display modes: without using the technique, in 2D, in 3D and in augmented reality. The example also contains a description of various drawing techniques and estimates them.
... • Return of Security Investment (ROSI): This subcategory consists of metrics that measure the effectiveness of the organization's security investment. Keeping track of the ROSI metrics can help in providing a quantitative justification for the organization's security expenditure (Kolomeec et al., 2017). ...
Article
Information Security Governance (ISG) is now considered a vital component of any organization’s Information Technology (IT) Governance. ISG consists of the processes, organizational structures, and most importantly, the corporate leadership involved in the safeguarding of organization’s information assets. Hence, the purpose of ISG is to bring information security to the attention of the executives such as CEOs and Boards, so that the executives can address the issues of information security and take security-related decisions that lead to outcomes that better align with organizational goals such as value delivery, better performance measurement, business process assurance, and risk management. In order for the corporate leadership to make data-driven decisions, data related to various security metrics are collected and presented in the form of dashboards. The goal of this article is to identify those security metrics that are particularly important from an ISG standpoint. A survey was performed on security literature to identify and categorize ISG metrics. An ISG metrics taxonomy was developed as a result of this study. Security teams can benefit from the ISG metrics taxonomy as, when creating security dashboards, the taxonomy can focus their attention on those specific security metrics that are of most value to the corporate leadership.
Article
This article discusses methods for evaluating the effectiveness of information presentation forms in application software, with a focus on developing a comprehensive methodology for assessing interfaces in information security monitoring and management systems. The user interface is a key element that affects the functionality, convenience, and aesthetic appeal of software. These aspects directly influence how users perceive and interact with the software, which is especially important in the context of information security systems to ensure effective and timely responses to incidents and threats. The aim of this study is to develop a comprehensive methodology that allows for the evaluation of the effectiveness of information presentations in security systems. This methodology combines user surveys to obtain an overall quality indicator of the interface with the use of the GOMS method (Goals, Operators, Methods, and Selection Rules) to assess the speed of task completion. The proposed methodology includes two main stages: the first stage involves user surveys to gather subjective assessments and determine an overall quality indicator of the interface; the second stage involves the application of the GOMS method, which provides a quantitative evaluation of interface efficiency by measuring the time users spend on completing tasks. These two stages complement each other, providing a comprehensive approach to evaluating the user interface. This approach allows for the classification of user interfaces into four quality levels: "excellent", "good", "satisfactory", and "unsatisfactory". The novelty of the study lies in its unique approach that combines both subjective and objective methods of analysis, providing a more accurate and comprehensive evaluation of interface quality in information security systems. The theoretical significance of the work is in the creation of a new methodology for evaluating user interfaces, which can be applied to various information security systems. The practical significance is in the potential use of the results to improve the interaction between operators and information security monitoring and management systems, ultimately enhancing the overall security and efficiency of information systems by improving the quality of operator decision-making. Future research plans include expanding the study to cover additional aspects such as the impact of cognitive loads on operators and adaptive visualization methods that can adjust to individual user characteristics.
Article
Full-text available
With each passing day, individuals, organizations, and even governmental entities are confronted with an escalating incidence of cybercrimes. Faced with limited resources and the increasing complexity of cyberattacks, organizations often find themselves incapable of detecting and preventing such malicious actions and necessitating investigative efforts to mitigate their consequences. The primary objective of this study is the development of a comprehensive model for cybercrime investigation. In constructing this model, we have drawn upon related literature concerning cybercrimes and their investigation, alongside employing a spectrum of research methodologies, including analysis and synthesis, examination and generalization, deduction, and induction. Through an analysis of the investigative phases and the required for them information, we have formulated a cybercrime investigation model. Furthermore, we have field-tested this model in the context of an insider attack investigation. It is envisaged that the proposed model can serve as a foundational framework for the formulation of practical guidelines pertaining to the investigation of information security incidents, applicable both in governmental and commercial organizations.
Chapter
Data visualization in the field of information security (IS) is becoming an urgent task. The more informative the visual display for the analyst, the faster and better he will be able to get the result. The visualization method is described in the article, which allows to reduce the time needed for determination the actual IS threats when processing the IS threat model. In the classic way of displaying, threat models are a list or a table of several tens of printed pages. To process such a volume of data, information security analysts need to spend a lot of time. It remains likely that the analyst will lose sight of important data. The article proposes a method for visualizing the spatio-temporal model of IS threats in three-dimensional and two-dimensional form. When visualizing a threat model, a surface with axes is used: time, risk, information asset. The proposed visualization of the IS threat model allows the analyst to identify current threats in less time. Scope - management of information security. The result of this work is a way to visualize the IS threat model, taking into account the spatio-temporal factor.
Conference Paper
Full-text available
The selection of security countermeasures against current cyber attacks does not generally perform appropriate assessments of the attack and countermeasure impact over the system. In addition, the methodologies used to evaluate and select countermeasures are generally based on assumptions, estimations, and expert knowledge. A great level of subjectivity is considered while estimating parameters such as benefits and importance of the investment in cost sensitive models. We propose in this paper a decision support tool that uses a Return On Response Investment (RORI) metric, and a 3D geometrical model to simulate the impact of attacks and countermeasures on the system. The former is a cost sensitive model used to evaluate, rank and select security countermeasures against complex cyber attacks. The latter, is a tool that represents the impact of attacks and countermeasures in a three dimensional coordinate system. As a result, we are able to automatically select mitigation strategies addressing multiple and complex cyber attacks, that are efficient in stopping the attack and preserve, at the same time, the best service to legitimate users. The implementation of the tool and main results are detailed at the end of the paper to show the applicability of our model.
Conference Paper
Full-text available
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP addresses, communication protocols, physical and logical resources, etc.). Every axis is composed of entities that contribute to the execution of the security event. Each entity has an associated weighting factor that measures its contribution using a multi-criteria methodology named CARVER. The graphical representation of cyber events is depicted as straight lines (one dimension) or polygons (two or more dimensions). Geometrical operations are used to compute the size (i.e, length, perimeter, surface area) and thus the impact of each event. As a result, it is possible to identify and compare the magnitude of cyber events. A case study with multiple security events is presented as an illustration on how the model is built and computed.
Conference Paper
Full-text available
In this paper we propose an approach to the development of the computer network visualization system for security monitoring, which uses a conceptually new model of graphic visualization that is similar to the Voronoi diagrams. The proposed graphical model uses the size, color and opacity of the cell to display host parameters. The paper describes a technique for new graphical model construction and gives examples of its application along with traditional graph based and other models.
Conference Paper
Full-text available
The selection of security countermeasures against current cyber attacks does not generally perform appropriate assessments of the attack and countermeasure impact over the system. In addition, the methodologies used to evaluate and select countermeasures are generally based on assumptions, estimations, and expert knowledge. A great level of subjectivity is considered while estimating parameters such as benefits and importance of the investment in cost sensitive models. We propose in this paper a decision support tool that uses a Return On Response Investment (RORI) metric, and a 3D geometrical model to simulate the impact of attacks and countermeasures on the system. The former is a cost sensitive model used to evaluate, rank and select security countermeasures against complex cyber attacks. The latter, is a tool that represents the impact of attacks and countermeasures in a three dimensional coordinate system. As a result, we are able to automatically select mitigation strategies addressing multiple and complex cyber attacks, that are efficient in stopping the attack and preserve, at the same time, the best service to legitimate users. The implementation of the tool and main results are detailed at the end of the paper to show the applicability of our model.
Conference Paper
The paper suggests an approach to countermeasure selection that is based on the application of quantitative risk metrics. The approach incorporates several techniques. These techniques differ for the static and dynamic modes of operation of the security analysis and countermeasure selection component. The techniques consider available input data on the network security state. The approach is based on the application of open standards for unified specification of security data, application of attack graphs and service dependency graphs to calculate different security metrics, and takes into account events and information from security information and events management (SIEM) systems.
Conference Paper
Security is getting an ever increasingly important issue in cyber-physical systems comprising autonomous systems. However, it is not possible to defend from all possible attacks for cost and performance reasons. An attack ranking is thus necessary. We propose a simulative framework that makes it possible to rank attacks according to their impact. We also describe a case study to assert its usefulness and effectiveness.
Conference Paper
We propose a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) as a prismatic instance of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP addresses, resources, etc.), as well as information about the attacker's knowledge, motivation and capabilities. The base of the prism is represented as an n-side polygon (e.g., triangle, square, pentagon, etc.), which depicts the internal information of the system, whereas the height of the prism is represented as a single axis which depicts the external information of the system. We propose geometrical operations to determine the impact of cyber security events (i.e., area, volume, event coverage, residual risk, and potential collateral damages). A case study is proposed at the end of the paper to show the applicability of the model in a scenario with multiple attacks.
Article
The impact quantification of attacks and security countermeasures is an active research in the information and communications technology domain. Supporters of the Return on Investment (ROI), and all its variants, propose quantitative models that estimate their parameters based on expert knowledge, statistical data, simulation and risk assessment tools. Although results are used for relative comparisons, a great level of subjectivity is considered while estimating each parameter composing the model. In single attack scenarios, the use of cost sensitive metrics allows the evaluation and selection of security countermeasures. However, for attacks against critical infrastructures, this approach is not accurate enough to determine the impact of the equipment(s), subject(s), and/or action(s) that take part in a security incident. This paper proposes, therefore, a geometrical model that represents the volume of systems, attacks and countermeasures based on a three-dimensional coordinate system (i.e., user, channel, and resource). As a result, volumes are related to risks, making it possible to select optimal countermeasures against complex attacks based on a cost-sensitive metric. A case study on a critical infrastructure control process is provided at the end of the paper to show the applicability of our model in a scenario with two attacks.
Article
In this chapter we present our methodology of security risk analysis of Enterprise Networks using Attack Graphs. We explain our methodology using three examples. Attack graphs provide the cumulative effect of attack steps to show how each of these steps can potentially enable an attacker to reach his goal. However, one limitation of attack graph is that it assumes that a vulnerability can always be exploited. In reality, there is a wide range of probabilities that different steps can be exploited. It is dependent on the skill of the attacker and the difficulty of the exploit. Attack graphs show what is possible without any indication of what is likely. In this section, we present a methodology to estimate the security risk using the scores of individual vulnerabilities.