7 research outputs found
KB4VA: A Knowledge Base of Visualization Designs for Visual Analytics
Visual analytics (VA) systems have been widely used to facilitate
decision-making and analytical reasoning in various application domains. VA
involves visual designs, interaction designs, and data mining, which is a
systematic and complex paradigm. In this work, we focus on the design of
effective visualizations for complex data and analytical tasks, which is a
critical step in designing a VA system. This step is challenging because it
requires extensive knowledge about domain problems and visualization to design
effective encodings. Existing visualization designs published in top venues are
valuable resources to inspire designs for problems with similar data structures
and tasks. However, those designs are hard to understand, parse, and retrieve
due to the lack of specifications. To address this problem, we build KB4VA, a
knowledge base of visualization designs in VA systems with comprehensive labels
about their analytical tasks and visual encodings. Our labeling scheme is
inspired by a workshop study with 12 VA researchers to learn user requirements
in understanding and retrieving professional visualization designs in VA
systems. The theme extends Vega-Lite specifications for describing advanced and
composited visualization designs in a declarative manner, thus facilitating
human understanding and automatic indexing. To demonstrate the usefulness of
our knowledge base, we present a user study about design inspirations for VA
tasks. In summary, our work opens new perspectives for enhancing the
accessibility and reusability of professional visualization designs
Anomaly Detection Using Robust Principal Component Analysis
In this MQP, we focus on the development of a visualization-enabled anomaly detection system. We examine the 2011 VAST dataset challenge to efficiently generate meaningful features and apply Robust Principal Component Analysis (RPCA) to detect any data points estimated to be anomalous. This is done through an infrastructure that promotes the closing of the loop from feature generation to anomaly detection through RPCA. We enable our user to choose subsets of data through a web application and learn through visualization systems where problems are within their chosen local data slice. In this report, we explore both feature engineering techniques along with optimizing RPCA which ultimately lead to a generalized approach for detecting anomalies within a defined network architecture
Anomaly Detection Using Robust Principal Component Analysis
In this Major Qualifying Project, we focus on the development of a visualization-enabled anomaly detection system. We examine the 2011 VAST dataset challenge to efficiently generate meaningful features and apply Robust Principal Component Analysis (RPCA) to detect any data points estimated to be anomalous. This is done through an infrastructure that promotes the closing of the loop from feature generation to anomaly detection through RPCA. We enable our user to choose subsets of the data through a web application and learn through visualization systems where problems are within their chosen local data slice. We explore both feature engineering techniques along with optimizing RPCA which ultimately lead to a generalized approach for detecting anomalies within a defined network architecture
A Pattern Approach to Examine the Design Space of Spatiotemporal Visualization
Pattern language has been widely used in the development of visualization systems. This dissertation applies a pattern language approach to explore the design space of spatiotemporal visualization. The study provides a framework for both designers and novices to communicate, develop, evaluate, and share spatiotemporal visualization design on an abstract level. The touchstone of the work is a pattern language consisting of fifteen design patterns and four categories. In order to validate the design patterns, the researcher created two visualization systems with this framework in mind. The first system displayed the daily routine of human beings via a polygon-based visualization. The second system showed the spatiotemporal patterns of co-occurring hashtags with a spiral map, sunburst diagram, and small multiples. The evaluation results demonstrated the effectiveness of the proposed design patterns to guide design thinking and create novel visualization practices
Interactive visualization of event logs for cybersecurity
Hidden cyber threats revealed with new visualization software Eventpa
Recommended from our members
Mining intrusion detection alert logs to minimise false positives & gain attack insight
Utilising Intrusion Detection System (IDS) logs in security event analysis is crucial in the process of assessing, measuring and understanding the security state of a computer network, often defined by its current exposure and resilience to network attacks. Thus, the study of understanding network attacks through event analysis is a fast growing emerging area. In comparison to its first appearance a decade ago, the complexities involved in achieving effective security event analysis have significantly increased. With such increased complexities, advances in security event analytical techniques are required in order to maintain timely mitigation and prediction of network attacks.
This thesis focusses on improving the quality of analysing network event logs, particularly intrusion detection logs by exploring alternative analytical methods which overcome some of the complexities involved in security event analysis. This thesis provides four key contributions. Firstly, we explore how the quality of intrusion alert logs can be improved by eliminating the large volume of false positive alerts contained in intrusion detection logs. We investigate probabilistic alert correlation, an alternative to traditional rule based correlation approaches. We hypothesise that probabilistic alert correlation aids in discovering and learning the evolving dependencies between alerts, further revealing attack structures and information which can be vital in eliminating false positives. Our findings showed that the results support our defined hypothesis, aligning consistently with existing literature. In addition, evaluating the model using recent attack datasets (in comparison to outdated datasets used in many research studies) allowed the discovery of a new set of issues relevant to modern security event log analysis which have only been introduced and addressed in few research studies.
Secondly, we propose a set of novel prioritisation metrics for the filtering of false positive intrusion alerts using knowledge gained during alert correlation. A combination of heuristic, temporal and anomaly detection measures are used to define metrics which capture characteristics identifiable in common attacks including denial-of-service attacks and worm propagations. The most relevant of the novel metrics, Outmet is based on the well known Local Outlier Factor algorithm. Our findings showed that with a slight trade-off of sensitivity (i.e. true positives performance), outmet reduces false positives significantly. In comparison to prior state-of-the-art, our findings show that it performs more efficiently given a variation of attack scenarios.
Thirdly, we extend a well known real-time clustering algorithm, CluStream in order to support the categorisation of attack patterns represented as graph like structures. Our motive behind attack pattern categorisation is to provide automated methods for capturing consistent behavioural patterns across a given class of attacks. To our knowledge, this is a novel approach to intrusion alert analysis. The extension of CluStream resulted is a novel light weight real-time clustering algorithm for graph structures. Our findings are new and complement existing literature. We discovered that in certain case studies, repetitive attack behaviour could be mined. Such a discovery could facilitate the prediction of future attacks.
Finally, we acknowledge that due to the intelligence and stealth involved in modern network attacks, automated analytical approaches alone may not suffice in making sense of intrusion detection logs. Thus, we explore visualisation and interactive methods for effective visual analysis which if combined with the automated approaches proposed, would improve the overall results of the analysis. The result of this is a visual analytic framework, integrated and tested in a commercial Cyber Security Event Analysis Software System distributed by British Telecom
The Development, Implementation, and Evaluation of an Evidence-Based Social Media Campaign Designed To Enhance Social Connectedness For First-Year University Students
The primary purpose of this study was to develop, implement, and evaluate the feasibility of a 10-week, evidence-based social media campaign (“iBelong@Western”) targeting the social connectedness of first-year university students (n = 30; Mage = 18.5, SD = 4.9) in London, Ontario. The secondary purpose was to explore participant perceptions of the campaign and its impact on social connectedness. Developed over a 3-month period using evidence-based approaches (e.g., participatory action research, SMILE framework), the campaign was implemented from March-May, 2023. Feasibility was assessed using social media analytics and data from one semi-structured interview; participant perceptions were explored using the latter only. Overall, results revealed that iBelong@Western demonstrated adequate feasibility and shows promise as a comprehensive, evidence-based knowledge translation tool designed to enhance social connectedness among first-year university students. While they cannot be generalized, the participant perspectives gathered may be useful in the development of future social media campaigns