請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74109
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 洪一平 | |
dc.contributor.author | Jia-Wei Lin | en |
dc.contributor.author | 林家緯 | zh_TW |
dc.date.accessioned | 2021-06-17T08:20:17Z | - |
dc.date.available | 2024-08-18 | |
dc.date.copyright | 2019-08-18 | |
dc.date.issued | 2019 | |
dc.date.submitted | 2019-08-13 | |
dc.identifier.citation | [1] Sauerwein, C., Sillaber, C., Mussmann, A., & Breu, R. (2017). Threat intelligence sharing platforms: An exploratory study of software vendors and research perspectives. 13th International Conference on Wirtschaftsinformatik (WI 2017) (pp. 837–851).
[2] Barnum, S. (2012). Standardizing cyber threat intelligence information with the structured threat information expression (stix). Mitre Corporation (Vol. 11, pp. 1-22). [3] Ware, C., & Mitchell, P. (2008). Visualizing graphs in three dimensions. ACM Transactions on Applied Perception (TAP) (Vol. 5, No. 1, p. 2). [4] Kwon, O. H., Muelder, C., Lee, K., & Ma, K. L. (2016). A study of layout, rendering, and interaction methods for immersive graph visualization. IEEE transactions on visualization and computer graphics (Vol. 22, No. 7, pp. 1802-1815). [5] Cordeil, M., Cunningham, A., Dwyer, T., Thomas, B. H., & Marriott, K. (2017, October). ImAxes: Immersive axes as embodied affordances for interactive multivariate data visualisation. In Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology (pp. 71-83). ACM. [6] Drogemuller, A., Cunningham, A., Walsh, J., Ross, W., & Thomas, B. H. (2017). VRige: exploring social network interactions in immersive virtual environments. In Proceedings of the international symposium on big data visual analytics (BDVA). IEEE NJ, USA. [7] Oculus developers. Store Review Policies. July 2019. https://developer.oculus.com/distribute/latest/concepts/publish-prep-app/ [8] VIVE Developers. VIVEPORT Submission Guide. July 2019. https://developer.vive.com/resources/knowledgebase/viveport-docs-eng/ [9] Leichtnam, L., Totel, E., Prigent, N., & Mé, L. (2017, October). STARLORD: Linked security data exploration in a 3D graph. In 2017 IEEE Symposium on Visualization for Cyber Security (VizSec) (pp. 1-4). IEEE. [10] Fransen, F., Smulders, A., & Kerkdijk, R. (2015). Cyber security information exchange to gain insight into the effects of cyber threats and incidents. e & i Elektrotechnik und Informationstechnik (Vol. 132, No. 2, pp. 106-112). [11] The MITRE Corporation. STIX Visualization Tool. July 2019. https://github.com/STIXProject/stix-viz/ [12] Brath, R. (2014, November). 3D InfoVis is here to stay: Deal with it. In 2014 IEEE VIS International Workshop on 3DVis (3DVis) (pp. 25-31). IEEE. [13] Itoh, T., Takakura, H., Sawada, A., & Koyamada, K. (2006). Hierarchical visualization of network intrusion detection data. IEEE Computer Graphics and Applications (No. 2, pp. 40-47). [14] Hideshima, Y., & Koike, H. (2006, January). STARMINE: A visualization system for cyber attacks. In Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation (Vol. 60, pp. 131-138). Australian Computer Society, Inc. [15] Wagner Filho, J. A., Freitas, C. M. D. S., & Nedel, L. (2018, June). VirtualDesk: a comfortable and efficient immersive information visualization approach. In Computer Graphics Forum (Vol. 37, No. 3, pp. 415-426). [16] Usher, W., Klacansky, P., Federer, F., Bremer, P. T., Knoll, A., Yarch, J., ... & Pascucci, V. (2017). A virtual reality visualization tool for neuron tracing. IEEE transactions on visualization and computer graphics (Vol. 24, No. 1, pp. 994-1003). [17] Zhang, M. J., Li, J., & Zhang, K. (2016, December). An immersive approach to the visual exploration of geospatial network datasets. In Proceedings of the 15th ACM SIGGRAPH Conference on Virtual-Reality Continuum and Its Applications in Industry-Volume 1 (pp. 381-390). ACM. [18] Millais, P., Jones, S. L., & Kelly, R. (2018, April). Exploring data in virtual reality: Comparisons with 2d data visualizations. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. LBW007). ACM. [19] Chandler, T., Cordeil, M., Czauderna, T., Dwyer, T., Glowacki, J., Goncu, C., ... & Wilson, E. (2015, September). Immersive analytics. In 2015 Big Data Visual Analytics (BDVA) (pp. 1-8). IEEE. [20] Wagner Filho, J. A., Rey, M. F., Freitas, C. M., & Nedel, L. (2018, March). Immersive visualization of abstract information: An evaluation on dimensionally-reduced data scatterplots. In 2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (pp. 483-490). IEEE. [21] Caggianese, G., Gallo, L., & Neroni, P. (2018, June). The Vive controllers vs. Leap motion for interactions in virtual environments: A comparative evaluation. In International Conference on Intelligent Interactive Multimedia Systems and Services (pp. 24-33). Springer, Cham. [22] Google. Tilt Brush. July 2019. https://www.tiltbrush.com/ [23] Oasis. Cyber Observable eXpression (CybOX). July 2019. http://cyboxproject.github.io/ [24] The MITRE Corporation. Python-stix. July 2019. https://github.com/STIXProject/python-stix/ [25] Neo4j. Using Neo4j from Python. July 2019. https://neo4j.com/developer/python/ [26] EclecticIQ. EclecticIQ. July 2019. https://www.eclecticiq.com/ [27] Brooke, J. (1996). SUS-A quick and dirty usability scale. Usability evaluation in industry (Vol. 189, No. 194, pp. 4-7). [28] Hart, S. G. (2006, October). NASA-task load index (NASA-TLX); 20 years later. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 50, No. 9, pp. 904-908). Sage CA: Los Angeles, CA: Sage publications. [29] Saraiya, P., North, C., & Duca, K. (2005). An insight-based methodology for evaluating bioinformatics visualizations. IEEE transactions on visualization and computer graphics (Vol. 11, No. 4, pp. 443-456). | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74109 | - |
dc.description.abstract | 現今的網路攻擊多變且複雜,與信任夥伴分享網路威脅情資有助於共同防禦這些攻擊。然而,目前用於分享網路威脅情資的標準格式其實非常難以探索,除非藉由視覺化工具的幫助,但傳統視覺化方法的幫助仍有限。隨著頭戴式顯示器的發展逐漸成熟,沉浸式資料視覺化有潛力提供比傳統的二維與三維視覺化方法更好的體驗。本篇論文提出了一個可以在沉浸式環境中分析網路威脅情資的互動式系統,此系統可以在虛擬實境中視覺化上萬個節點與邊,同時保持九十幅以上的高影格率。並且我們與網路安全專家合作,設計和實作了許多探索網路威脅情資的互動技巧。最後,本篇論文以兩個實驗來評估這套系統。實驗結果顯示,比起傳統的視覺化工具,受測者用此系統能夠更快地找到必要的資訊,並在系統易用性量表和工作負擔量表上的表現都更好。若是在探索已經被資安專家整理過的網路威脅情資的情況,則使用此系統和其電腦桌面對應版本的表現非常接近,但沉浸式資料視覺化造成的心理負擔較低。 | zh_TW |
dc.description.abstract | Sharing cyber threat information between organizations is important to amplify the defense against sophisticated cyber attacks. However, the standard format for describing and exchanging cyber threat information is difficult to explore without the help of visualization techniques. As the head-mounted display (HMD) technology becomes more mature, immersive visualization approaches have the potential to provide better experiences. In this work, we present an interactive system for exploring cybersecurity information in the immersive environment, which utilizes the C# job system and entity component system (ECS) architecture to visualize tens of thousands of nodes and edges with a high framerate (>90 FPS). We collaborated with cybersecurity experts to design several interaction techniques based on their insights into the analysis of cyber threat information. Finally, we conducted two user studies. The results show that participants could find essential information faster using our system compared to the 2D graph visualization tool, and the system usability and user workload were also better. When exploring the cybersecurity data which has been arranged by cybersecurity experts, users could achieve similar performance using our virtual reality (VR) system and the desktop-based counterpart. Nevertheless, immersive visualization caused a lower mental workload. | en |
dc.description.provenance | Made available in DSpace on 2021-06-17T08:20:17Z (GMT). No. of bitstreams: 1 ntu-108-R06922025-1.pdf: 12831815 bytes, checksum: 306825b72cff2c12cbf0f4884fdaac30 (MD5) Previous issue date: 2019 | en |
dc.description.tableofcontents | 口試委員會審定書 #
誌謝 i 中文摘要 ii ABSTRACT iii CONTENTS iv LIST OF FIGURES vii LIST OF TABLES ix Chapter 1 Introduction 1 Chapter 2 Related Work 3 2.1 Exchanging Cyber Threat Information 3 2.2 Immersive Information Visualization 4 2.3 Interaction for Immersive Data Visualization 5 Chapter 3 Graph Visualization of STIX Data 7 3.1 Node 7 3.2 Edge 9 3.3 Layout 9 Chapter 4 Interaction Design 11 4.1 Basic Interactions 12 4.1.1 Navigation 12 4.1.2 Selecting and Highlighting 12 4.1.3 Moving a node 12 4.1.4 Calling Neighbors and Pinning 13 4.2 Multi-select Box 14 4.2.1 Creating, Deleting, and Resizing 14 4.2.2 Box Panel 15 4.2.3 Label 16 4.3 Interactive Panels 17 4.3.1 Detail Panel 17 4.3.2 Filter Panel 19 4.3.3 Time Panel 20 Chapter 5 System Overview 22 5.1 Methods 22 5.1.1 Rendering 22 5.1.2 Manipulation 23 5.2 System Workflow 24 5.2.1 Preprocessing 24 5.2.2 System Initialization 25 5.2.3 Runtime 25 Chapter 6 Evaluation 26 6.1 User Study 1: Exploring STIX Data 26 6.1.1 Experiment Design 26 6.1.2 Tasks 27 6.1.3 Participants 28 6.1.4 Procedure 29 6.1.5 Results 30 6.2 User Study 2: Analyzing Sorted STIX Data 33 6.2.1 Experiment Design 33 6.2.2 Tasks 35 6.2.3 Participants 36 6.2.4 Procedure 36 6.2.5 Results 37 Chapter 7 Discussion 41 7.1 Expanding All the Data in Virtual Environment 41 7.2 Domain Knowledge and Tasks 41 7.3 Use of the Interaction Techniques 42 Chapter 8 Conclusion 43 REFERENCES 44 | |
dc.language.iso | en | |
dc.title | 藉由沈浸式資料視覺化與資料探索來分析網路威脅情資 | zh_TW |
dc.title | Immersive Data Visualization and Exploration for Analyzing Cyber Threat Information | en |
dc.type | Thesis | |
dc.date.schoolyear | 107-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 莊永裕,詹力韋,林經堯 | |
dc.subject.keyword | 資料視覺化,沉浸式環境,網路安全,虛擬實境, | zh_TW |
dc.subject.keyword | data visualization,immersive environments,cybersecurity,virtual reality, | en |
dc.relation.page | 47 | |
dc.identifier.doi | 10.6342/NTU201903075 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2019-08-14 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-108-1.pdf 目前未授權公開取用 | 12.53 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。