Skip to main content

2018 | OriginalPaper | Buchkapitel

From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform

verfasst von : Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel

Erschienen in: Information Systems Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Although collaborative practices between cyber organizations are well documented, managing activities within these organizations is still challenging as cyber operators tasks are very demanding and usually done individually. As human factors studies in cyber environments are still difficult to perform, tools and collaborative practices are evolving slowly and training is always required to increase teamwork efficiency. Contrary to other research fields, cyber security is not harnessing yet the capabilities of Collaborative Virtual Environments (CVE) which can be used both for immersive and interactive data visualization and serious gaming for training. In order to tackle cyber security teamwork issues, we propose a 3D CVE called the 3D Cyber Common Operational Picture, which aims at taking advantage of CVE practices to enhance cyber collaborative activities.
Based on four Security Operations Centers (SOCs) visits we have made in different organizations, we have designed a cyber collaborative activity model which has been used as a reference to design our 3D CyberCOP platform features, such as asymetrical collaboration, mutual awareness and roles specialization. Our approach can be adapted to several use cases, and we are currently developing a cyber incident analysis scenario based on an event-driven architecture, as a proof of concept.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Ahrend, J.M., Jirotka, M., Jones, K.: On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge. In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pp. 1–10, June 2016. https://doi.org/10.1109/CyberSA.2016.7503279 Ahrend, J.M., Jirotka, M., Jones, K.: On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge. In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pp. 1–10, June 2016. https://​doi.​org/​10.​1109/​CyberSA.​2016.​7503279
3.
Zurück zum Zitat Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M.: A review of using gaming technology for cyber-security awareness. Int. J. Inf. Secur. Res. (IJISR) 6(2), 660–666 (2016) Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M.: A review of using gaming technology for cyber-security awareness. Int. J. Inf. Secur. Res. (IJISR) 6(2), 660–666 (2016)
6.
Zurück zum Zitat Chandler, T., et al.: Immersive analytics. In: Big Data Visual Analytics (BDVA), pp. 1–8. IEEE (2015) Chandler, T., et al.: Immersive analytics. In: Big Data Visual Analytics (BDVA), pp. 1–8. IEEE (2015)
12.
Zurück zum Zitat Gros, P., Abel, P., Dos Santos, R., Loisel, D., Trichaud, N., Paris, J.: Experimenting service-oriented 3D metaphors for managing networks using virtual reality. In: Laval Virtual-Virtual Reality International Conference, May 2000 Gros, P., Abel, P., Dos Santos, R., Loisel, D., Trichaud, N., Paris, J.: Experimenting service-oriented 3D metaphors for managing networks using virtual reality. In: Laval Virtual-Virtual Reality International Conference, May 2000
13.
Zurück zum Zitat Guimaraes, V.T., Freitas, C.M.D.S., Sadre, R., Tarouco, L.M.R., Granville, L.Z.: A survey on information visualization for network and service management. IEEE Commun. Surv. Tutor. 18(1), 285–323 (2016)CrossRef Guimaraes, V.T., Freitas, C.M.D.S., Sadre, R., Tarouco, L.M.R., Granville, L.Z.: A survey on information visualization for network and service management. IEEE Commun. Surv. Tutor. 18(1), 285–323 (2016)CrossRef
15.
Zurück zum Zitat Hámornik, B.P., Krasznay, C.: Prerequisites of virtual teamwork in security operations centers: knowledge, skills, abilities and other characteristics. Acad. Appl. Res. Mil. Public Manag. Sci. 16, 73 (2017) Hámornik, B.P., Krasznay, C.: Prerequisites of virtual teamwork in security operations centers: knowledge, skills, abilities and other characteristics. Acad. Appl. Res. Mil. Public Manag. Sci. 16, 73 (2017)
18.
Zurück zum Zitat Kabil, A., Thierry, D., Nora, C., Gerard, L., Yoran, H., Christophe, P.: Why should we use 3D collaborative virtual environments (3DCVE) for cyber security? In: 2018 IEEE Third VR International Workshop on Collaborative Virtual Environments (3DCVE), March 2018 Kabil, A., Thierry, D., Nora, C., Gerard, L., Yoran, H., Christophe, P.: Why should we use 3D collaborative virtual environments (3DCVE) for cyber security? In: 2018 IEEE Third VR International Workshop on Collaborative Virtual Environments (3DCVE), March 2018
19.
21.
Zurück zum Zitat Le Chénéchal, M., Chalmé, S., Duval, T., Royan, J., Gouranton, V., Arnaldi, B.: Toward an enhanced mutual awareness in asymmetric CVE. In: Proceedings of International Conference on Collaboration Technologies and Systems (CTS 2015) (2015) Le Chénéchal, M., Chalmé, S., Duval, T., Royan, J., Gouranton, V., Arnaldi, B.: Toward an enhanced mutual awareness in asymmetric CVE. In: Proceedings of International Conference on Collaboration Technologies and Systems (CTS 2015) (2015)
23.
Zurück zum Zitat McKenna, S., Staheli, D., Meyer, M.: Unlocking user-centered design methods for building cyber security visualizations. In: 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1–8. IEEE (2015) McKenna, S., Staheli, D., Meyer, M.: Unlocking user-centered design methods for building cyber security visualizations. In: 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1–8. IEEE (2015)
24.
Zurück zum Zitat Michel, M.C.K., Helmick, N.P., Mayron, L.M.: Cognitive cyber situational awareness using virtual worlds. In: 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 179–182, February 2011. https://doi.org/10.1109/COGSIMA.2011.5753440 Michel, M.C.K., Helmick, N.P., Mayron, L.M.: Cognitive cyber situational awareness using virtual worlds. In: 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 179–182, February 2011. https://​doi.​org/​10.​1109/​COGSIMA.​2011.​5753440
25.
Zurück zum Zitat Newhouse, W., Keith, S., Scribner, B., Witte, G.: National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Spec. Publ. 800, 181 (2017) Newhouse, W., Keith, S., Scribner, B., Witte, G.: National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Spec. Publ. 800, 181 (2017)
27.
Zurück zum Zitat Pirker, J., Gütl, C.: Virtual worlds for 3D visualizations. In: 11th International Conference on Intelligent Environments (Workshop), pp. 265–272 (2015) Pirker, J., Gütl, C.: Virtual worlds for 3D visualizations. In: 11th International Conference on Intelligent Environments (Workshop), pp. 265–272 (2015)
31.
Zurück zum Zitat Robinson, M., Jones, K., Janicke, H., Maglaras, L.: Developing Cyber Peacekeeping: Observation. Monitoring and Reporting, ArXiv e-prints, June 2018 Robinson, M., Jones, K., Janicke, H., Maglaras, L.: Developing Cyber Peacekeeping: Observation. Monitoring and Reporting, ArXiv e-prints, June 2018
34.
Zurück zum Zitat Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph. 18(8), 1313–1329 (2012)CrossRef Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph. 18(8), 1313–1329 (2012)CrossRef
35.
36.
Zurück zum Zitat von Solms, R., van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013). Cybercrime in the Digital EconomyCrossRef von Solms, R., van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013). Cybercrime in the Digital EconomyCrossRef
39.
Zurück zum Zitat Takahashi, T., Kadobayashi, Y., Nakao, K.: Toward global cybersecurity collaboration: cybersecurity operation activity model. In: Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human? - Innovations for Future Networks and Services (K-2011), pp. 1–8, December 2011 Takahashi, T., Kadobayashi, Y., Nakao, K.: Toward global cybersecurity collaboration: cybersecurity operation activity model. In: Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human? - Innovations for Future Networks and Services (K-2011), pp. 1–8, December 2011
41.
Zurück zum Zitat Zhong, Z., et al.: A user-centered multi-space collaborative visual analysis for cyber security. Chin. J. Electron. 27, 910–919 (2018)CrossRef Zhong, Z., et al.: A user-centered multi-space collaborative visual analysis for cyber security. Chin. J. Electron. 27, 910–919 (2018)CrossRef
Metadaten
Titel
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform
verfasst von
Alexandre Kabil
Thierry Duval
Nora Cuppens
Gérard Le Comte
Yoran Halgand
Christophe Ponchel
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-05171-6_14

Premium Partner