Visualizing insider threats: An effective interface for security analytics

Bar Haim, Eitan Menahem, Yaron Wolfsthal, Christopher Meenan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

With the ever-growing volume of cyber-attacks on organizations, security analysts require effective visual interfaces and interaction techniques to detect security breaches and, equally importantly, to efficiently share threat information. To support this need, we present a tool called "User Behavior Analytics" (UBA) that conducts continuous analysis of individuals' usage of their organizational IT networks, and effectively visualizes the associated security exposures of the organization. The UBA tool was developed as an extension of IBM's security analytics environment, and incorporates a risk-focused dashboard that highlights anomalous user behaviors and the aggregated risk levels associated with individual users, user groups, and overall system security state. Moreover, the tool's dashboard has been designed to facilitate rapid review of security incidents and correlate them with data from various sources such as user directory and HR systems. In doing so, the tool presents busy security analysts with an effective means to visually identify and respond to cyber threats on the organization's crown jewels. Copyright is held by the author/owner(s).

Original languageEnglish
Title of host publicationIUI 2017 - Companion of the 22nd International Conference on Intelligent User Interfaces
PublisherAssociation for Computing Machinery
Pages39-42
Number of pages4
ISBN (Electronic)9781450348935
DOIs
StatePublished - 7 Mar 2017
Externally publishedYes
Event22nd International Conference on Intelligent User Interfaces, IUI 2017 - Limassol, Cyprus
Duration: 13 Mar 201716 Mar 2017

Publication series

NameInternational Conference on Intelligent User Interfaces, Proceedings IUI

Conference

Conference22nd International Conference on Intelligent User Interfaces, IUI 2017
Country/TerritoryCyprus
CityLimassol
Period13/03/1716/03/17

Keywords

  • Anomaly detection
  • Insider threat
  • User behavior analytics

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction

Fingerprint

Dive into the research topics of 'Visualizing insider threats: An effective interface for security analytics'. Together they form a unique fingerprint.

Cite this