CA2: Cyber Attacks Analytics

08/11/2023
by   Luyu Cheng, et al.
0

The VAST Challenge 2020 Mini-Challenge 1 requires participants to identify the responsible white hat groups behind a fictional Internet outage. To address this task, we have created a visual analytics system named CA2: Cyber Attacks Analytics. This system is designed to efficiently compare and match subgraphs within an extensive graph containing anonymized profiles. Additionally, we showcase an iterative workflow that utilizes our system's capabilities to pinpoint the responsible group.

READ FULL TEXT
research
05/21/2018

The Sounds of Cyber Threats

The Internet enables users to access vast resources, but it can also exp...
research
07/07/2016

Argumentation Models for Cyber Attribution

A major challenge in cyber-threat analysis is combining information from...
research
03/29/2022

Process Mining Analysis of Puzzle-Based Cybersecurity Training

The hands-on cybersecurity training quality is crucial to mitigate cyber...
research
09/20/2021

Egocentric Network Exploration for Immersive Analytics

To exploit the potential of immersive network analytics for engaging and...
research
06/02/2023

RITA: Group Attention is All You Need for Timeseries Analytics

Timeseries analytics is of great importance in many real-world applicati...

Please sign up or login with your details

Forgot password? Click here to reset