Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Toward a Visualization-Supported Workflow for Cyber Alert Management using Threat Models and Human-Centered Design

Conference ·

Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated tool support in the effort to make their tasks more efficient, accurate, and timely. This tool support comes in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for exploring rich and noisy data sets. Cyber analysts, however, often speak of a need for tools which help them merge the data they already have and help them establish appropriate baselines against which to compare potential anomalies. Furthermore, existing threat models that cyber analysts regularly use to structure their investigation are not often leveraged in support tools. We report on our work with cyber analysts to understand they analytic process and how one such model, the MITRE ATT&CK Matrix [32], is used to structure their analytic thinking. We present our efforts to map specific data needed by analysts into the threat model to inform our eventual visualization designs. We examine data mapping for gaps where the threat model is under-supported by either data or tools. We discuss these gaps as potential design spaces for future research efforts. We also discuss the design of a prototype tool that combines machine-learning and visualization components to support cyber analysts working with this threat model.

Research Organization:
Pacific Northwest National Laboratory (PNNL), Richland, WA (US)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC05-76RL01830
OSTI ID:
1415703
Report Number(s):
PNNL-SA-127976
Country of Publication:
United States
Language:
English

Similar Records

Cyber Threat Dictionary Using MITRE ATT&CK Matrix and NIST Cybersecurity Framework Mapping
Conference · Sun Nov 01 23:00:00 EST 2020 · OSTI ID:1734565

Requirements and Recommendations for a Physical Attack Characterization Framework
Technical Report · Sat Jul 01 00:00:00 EDT 2023 · OSTI ID:2229613

Hybrid Attack Graph Generation with Graph Convolutional Deep-Q Learning
Conference · Sat Dec 30 23:00:00 EST 2023 · OSTI ID:2336568