Show simple item record  

dc.contributor.authorGarae, Jefferyen_NZ
dc.contributor.authorKo, Ryan K.L.en_NZ
dc.contributor.authorKho, Janiceen_NZ
dc.contributor.authorSuwadi, Saidahen_NZ
dc.contributor.authorWill, Mark A.en_NZ
dc.contributor.authorApperley, Marken_NZ
dc.coverage.spatialSydney, Australiaen_NZ
dc.date.accessioned2018-05-28T22:06:47Z
dc.date.available2017-01-01en_NZ
dc.date.available2018-05-28T22:06:47Z
dc.date.issued2017en_NZ
dc.identifier.citationGarae, J., Ko, R. K. L., Kho, J., Suwadi, S., Will, M. A., & Apperley, M. (2017). Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors. In Proceedings of 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 1123–1130). Washington, DC, USA: IEEE. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.362en
dc.identifier.issn2324-9013en_NZ
dc.identifier.urihttps://hdl.handle.net/10289/11868
dc.description.abstractDatasets are important for security analytics and mitigation processes in cyber security research and investigations. "Cyber security challenge (CSC)" events provide the means to collect datasets. The New Zealand National cyber security challenge event is designed to promote cyber security education, awareness and equally as important, collect datasets for research purposes. In this paper, we present the: (1) Importance of cyber security challenge events, (2) Highlight the importance of collecting datasets, and (3) present a user-centric security visualization model of attack behaviors. User-centric features with the theoretical concept of Data Provenance as a Security Visualization Service (DPaaSVS) reused to display attacks commencing at the reconnaissance stage through to compromising a defending team machine and exploiting the systems. DPaaSVS creates the ability for users to interact and observe correlations between cyber-attacks. Finally we provide future work on Security Visualization with Augmented Reality capabilities to enhance and improve user interactions with the security visualization platform.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.publisherIEEEen_NZ
dc.rights© 2017 IEEE. This is the author's accepted version. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
dc.source16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systemsen_NZ
dc.subjectScience & Technologyen_NZ
dc.subjectTechnologyen_NZ
dc.subjectComputer Science, Information Systemsen_NZ
dc.subjectComputer Science, Theory & Methodsen_NZ
dc.subjectComputer Scienceen_NZ
dc.subjectSecurity Visualizationen_NZ
dc.subjectCyber-attacksen_NZ
dc.subjectUser-centricityen_NZ
dc.subjectData Provenanceen_NZ
dc.subjectDatasetsen_NZ
dc.titleVisualizing the New Zealand Cyber Security Challenge for Attack Behaviorsen_NZ
dc.typeConference Contribution
dc.identifier.doi10.1109/Trustcom/BigDataSE/ICESS.2017.362en_NZ
dc.relation.isPartOfProceedings of 2017 IEEE Trustcom/BigDataSE/ICESSen_NZ
pubs.begin-page1123
pubs.elements-id200985
pubs.end-page1130
pubs.finish-date2017-08-04en_NZ
pubs.place-of-publicationWashington, DC, USA
pubs.publication-statusPublisheden_NZ
pubs.start-date2017-08-01en_NZ


Files in this item

This item appears in the following Collection(s)

Show simple item record