SlideShare a Scribd company logo
1 of 13
Download to read offline
UNIVERSIDAD POLITÉCNICA de VALENCIA
VALENCIA, SPAIN
Salvador Llopis
Javier Hingant
Israel Pérez
Manuel Esteve
Federico Carvajal
IEEE International Conference on Military Communication
and Information Systems (ICMCIS)
Warsaw, 23 May 2018
Wim Mees
Thibault Debatty
ROYAL MILITARY ACADEMY,
BRUSSELS, BELGIUM
A comparative analysis of visualisation
techniques to achieve CySA in the
military
Agenda
• Introduction
• Process
• 3D Operational Picture
• Cyber Common Operational Picture, CyCOP
• Comparative Analysis
• Conclusions and Future work
Introduction
“A common operational picture (COP) for cyberspace
facilitates Command and Control (C2) of Cyber Operations
and real-time comprehensive Situational Awareness”
(United States, Joint Publication 3-12 (R), Cyberspace Operations, 2013)
Introduction
• Visualisation is an integral part of the CySA
• Technical and Operational views serve different purposes
• Different visualisation approaches may lead to different
levels of comprehension of the situation
• Perceived reality on the screen may vary due to the
human nature, skills and experience
• Maximum awareness threshold is called “ground-truth”
Introduction
Key questions:
- How to fulfil user requirements regarding the tasks to
be performed
VISUALISATION ADAPTED TO USERS´ NEEDS
- Which technologies suit best this performance
TYPE OF REPRESENTATION
WHICH ELEMENTS TO DISPLAY
VALIDATION
Process
• Fictional scenario: MINET - physical nodes and cyber
elements
• Simulated data sources
• Set of measurements
• Two types of representation: 3D OP and CyCOP
• Comparative analysis
• Approach Implementation aspects
3D Operational Picture
Visualisation for Improved Situation
Awareness (VISA)
“Mission-Attacker-Controls”
CyCOP
CyCOP
Comparative Analysis
• Complementarity. Implementation of external
interfaces in combination with a representation of
mission-critical aspects
• Multi-format representations
• Reporting
• Real-time data feeds as opposed to offline data
• Granularity
• Assist decision-making
• Mission oriented
Conclusions and Future Work
• Experimental validation using SAGAT
• Develop an objective measure of CySA
• Improvements: data classification and decision-making
• Automatic refinement on visualisation by AI
Thank you for your attention

More Related Content

Similar to A comparative analysis of visualisation techniques to achieve CySA in the military

Cio conference gary bullock
Cio conference   gary bullockCio conference   gary bullock
Cio conference gary bullock
Gillian Friend
 
[HCII2011] Performance Visualization for Large Scale Computing System - A Lit...
[HCII2011] Performance Visualization for Large Scale Computing System - A Lit...[HCII2011] Performance Visualization for Large Scale Computing System - A Lit...
[HCII2011] Performance Visualization for Large Scale Computing System - A Lit...
Qin Gao
 
Traffic Congestion Detection Using Deep Learning
Traffic Congestion Detection Using Deep LearningTraffic Congestion Detection Using Deep Learning
Traffic Congestion Detection Using Deep Learning
ijtsrd
 
csec66 a user mode implementation of filtering rule management plane on virtu...
csec66 a user mode implementation of filtering rule management plane on virtu...csec66 a user mode implementation of filtering rule management plane on virtu...
csec66 a user mode implementation of filtering rule management plane on virtu...
Ruo Ando
 
An_Introduction_to_Virtualization_and_Cloud_Technologies_to_Support_Grid_Comp...
An_Introduction_to_Virtualization_and_Cloud_Technologies_to_Support_Grid_Comp...An_Introduction_to_Virtualization_and_Cloud_Technologies_to_Support_Grid_Comp...
An_Introduction_to_Virtualization_and_Cloud_Technologies_to_Support_Grid_Comp...
Deepika Koundal Kashib
 

Similar to A comparative analysis of visualisation techniques to achieve CySA in the military (20)

Scientific visualization
Scientific visualizationScientific visualization
Scientific visualization
 
Cyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity TrainingCyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity Training
 
Challenges on geo spatial visual analytics eurographics
Challenges on geo spatial visual analytics eurographicsChallenges on geo spatial visual analytics eurographics
Challenges on geo spatial visual analytics eurographics
 
AIWAC - AFFECTIVE INTERACTION THROUGH WEARABLE COMPUTING AND CLOUD TECHNOLOGY
AIWAC - AFFECTIVE INTERACTION THROUGH WEARABLE COMPUTING AND CLOUD TECHNOLOGYAIWAC - AFFECTIVE INTERACTION THROUGH WEARABLE COMPUTING AND CLOUD TECHNOLOGY
AIWAC - AFFECTIVE INTERACTION THROUGH WEARABLE COMPUTING AND CLOUD TECHNOLOGY
 
Vehicular Networks
Vehicular NetworksVehicular Networks
Vehicular Networks
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptx
 
Seminar 2019 at CSE
Seminar 2019 at CSESeminar 2019 at CSE
Seminar 2019 at CSE
 
#VQEG #QUADRIVIA 2020
#VQEG #QUADRIVIA 2020#VQEG #QUADRIVIA 2020
#VQEG #QUADRIVIA 2020
 
A 3D Immersive novel tool for digital twins using virtual choreographies: the...
A 3D Immersive novel tool for digital twins using virtual choreographies: the...A 3D Immersive novel tool for digital twins using virtual choreographies: the...
A 3D Immersive novel tool for digital twins using virtual choreographies: the...
 
Cio conference gary bullock
Cio conference   gary bullockCio conference   gary bullock
Cio conference gary bullock
 
Task-Driven Plasticity: One Step Forward with UbiDraw
Task-Driven Plasticity: One Step Forward with UbiDrawTask-Driven Plasticity: One Step Forward with UbiDraw
Task-Driven Plasticity: One Step Forward with UbiDraw
 
[HCII2011] Performance Visualization for Large Scale Computing System - A Lit...
[HCII2011] Performance Visualization for Large Scale Computing System - A Lit...[HCII2011] Performance Visualization for Large Scale Computing System - A Lit...
[HCII2011] Performance Visualization for Large Scale Computing System - A Lit...
 
Emerging cloud computing paradigm vision, research challenges and development...
Emerging cloud computing paradigm vision, research challenges and development...Emerging cloud computing paradigm vision, research challenges and development...
Emerging cloud computing paradigm vision, research challenges and development...
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital Ecosystem
 
Traffic Congestion Detection Using Deep Learning
Traffic Congestion Detection Using Deep LearningTraffic Congestion Detection Using Deep Learning
Traffic Congestion Detection Using Deep Learning
 
Scaling software challenges
Scaling software challengesScaling software challenges
Scaling software challenges
 
Human Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkHuman Activity Recognition Using Neural Network
Human Activity Recognition Using Neural Network
 
csec66 a user mode implementation of filtering rule management plane on virtu...
csec66 a user mode implementation of filtering rule management plane on virtu...csec66 a user mode implementation of filtering rule management plane on virtu...
csec66 a user mode implementation of filtering rule management plane on virtu...
 
Virtual reality technology
Virtual reality technologyVirtual reality technology
Virtual reality technology
 
An_Introduction_to_Virtualization_and_Cloud_Technologies_to_Support_Grid_Comp...
An_Introduction_to_Virtualization_and_Cloud_Technologies_to_Support_Grid_Comp...An_Introduction_to_Virtualization_and_Cloud_Technologies_to_Support_Grid_Comp...
An_Introduction_to_Virtualization_and_Cloud_Technologies_to_Support_Grid_Comp...
 

More from Thibault Debatty

Parallel SPAM Clustering with Hadoop
Parallel SPAM Clustering with HadoopParallel SPAM Clustering with Hadoop
Parallel SPAM Clustering with Hadoop
Thibault Debatty
 

More from Thibault Debatty (15)

An introduction to similarity search and k-nn graphs
An introduction to similarity search and k-nn graphsAn introduction to similarity search and k-nn graphs
An introduction to similarity search and k-nn graphs
 
Blockchain for dummies
Blockchain for dummiesBlockchain for dummies
Blockchain for dummies
 
Building a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessBuilding a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation Awareness
 
Design and analysis of distributed k-nearest neighbors graph algorithms
Design and analysis of distributed k-nearest neighbors graph algorithmsDesign and analysis of distributed k-nearest neighbors graph algorithms
Design and analysis of distributed k-nearest neighbors graph algorithms
 
Cyber Range
Cyber RangeCyber Range
Cyber Range
 
Easy Server Monitoring
Easy Server MonitoringEasy Server Monitoring
Easy Server Monitoring
 
Data diode
Data diodeData diode
Data diode
 
USB Portal
USB PortalUSB Portal
USB Portal
 
Smart Router
Smart RouterSmart Router
Smart Router
 
Web shell detector
Web shell detectorWeb shell detector
Web shell detector
 
Graph based APT detection
Graph based APT detectionGraph based APT detection
Graph based APT detection
 
Multi-Agent System for APT Detection
Multi-Agent System for APT DetectionMulti-Agent System for APT Detection
Multi-Agent System for APT Detection
 
Building k-nn Graphs From Large Text Data
Building k-nn Graphs From Large Text DataBuilding k-nn Graphs From Large Text Data
Building k-nn Graphs From Large Text Data
 
Determining the k in k-means with MapReduce
Determining the k in k-means with MapReduceDetermining the k in k-means with MapReduce
Determining the k in k-means with MapReduce
 
Parallel SPAM Clustering with Hadoop
Parallel SPAM Clustering with HadoopParallel SPAM Clustering with Hadoop
Parallel SPAM Clustering with Hadoop
 

Recently uploaded

audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 

Recently uploaded (16)

Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 

A comparative analysis of visualisation techniques to achieve CySA in the military

  • 1. UNIVERSIDAD POLITÉCNICA de VALENCIA VALENCIA, SPAIN Salvador Llopis Javier Hingant Israel Pérez Manuel Esteve Federico Carvajal IEEE International Conference on Military Communication and Information Systems (ICMCIS) Warsaw, 23 May 2018 Wim Mees Thibault Debatty ROYAL MILITARY ACADEMY, BRUSSELS, BELGIUM
  • 2. A comparative analysis of visualisation techniques to achieve CySA in the military
  • 3. Agenda • Introduction • Process • 3D Operational Picture • Cyber Common Operational Picture, CyCOP • Comparative Analysis • Conclusions and Future work
  • 4. Introduction “A common operational picture (COP) for cyberspace facilitates Command and Control (C2) of Cyber Operations and real-time comprehensive Situational Awareness” (United States, Joint Publication 3-12 (R), Cyberspace Operations, 2013)
  • 5. Introduction • Visualisation is an integral part of the CySA • Technical and Operational views serve different purposes • Different visualisation approaches may lead to different levels of comprehension of the situation • Perceived reality on the screen may vary due to the human nature, skills and experience • Maximum awareness threshold is called “ground-truth”
  • 6. Introduction Key questions: - How to fulfil user requirements regarding the tasks to be performed VISUALISATION ADAPTED TO USERS´ NEEDS - Which technologies suit best this performance TYPE OF REPRESENTATION WHICH ELEMENTS TO DISPLAY VALIDATION
  • 7. Process • Fictional scenario: MINET - physical nodes and cyber elements • Simulated data sources • Set of measurements • Two types of representation: 3D OP and CyCOP • Comparative analysis • Approach Implementation aspects
  • 8. 3D Operational Picture Visualisation for Improved Situation Awareness (VISA) “Mission-Attacker-Controls”
  • 10. CyCOP
  • 11. Comparative Analysis • Complementarity. Implementation of external interfaces in combination with a representation of mission-critical aspects • Multi-format representations • Reporting • Real-time data feeds as opposed to offline data • Granularity • Assist decision-making • Mission oriented
  • 12. Conclusions and Future Work • Experimental validation using SAGAT • Develop an objective measure of CySA • Improvements: data classification and decision-making • Automatic refinement on visualisation by AI
  • 13. Thank you for your attention