Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74109
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor洪一平
dc.contributor.authorJia-Wei Linen
dc.contributor.author林家緯zh_TW
dc.date.accessioned2021-06-17T08:20:17Z-
dc.date.available2024-08-18
dc.date.copyright2019-08-18
dc.date.issued2019
dc.date.submitted2019-08-13
dc.identifier.citation[1] Sauerwein, C., Sillaber, C., Mussmann, A., & Breu, R. (2017). Threat intelligence sharing platforms: An exploratory study of software vendors and research perspectives. 13th International Conference on Wirtschaftsinformatik (WI 2017) (pp. 837–851).
[2] Barnum, S. (2012). Standardizing cyber threat intelligence information with the structured threat information expression (stix). Mitre Corporation (Vol. 11, pp. 1-22).
[3] Ware, C., & Mitchell, P. (2008). Visualizing graphs in three dimensions. ACM Transactions on Applied Perception (TAP) (Vol. 5, No. 1, p. 2).
[4] Kwon, O. H., Muelder, C., Lee, K., & Ma, K. L. (2016). A study of layout, rendering, and interaction methods for immersive graph visualization. IEEE transactions on visualization and computer graphics (Vol. 22, No. 7, pp. 1802-1815).
[5] Cordeil, M., Cunningham, A., Dwyer, T., Thomas, B. H., & Marriott, K. (2017, October). ImAxes: Immersive axes as embodied affordances for interactive multivariate data visualisation. In Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology (pp. 71-83). ACM.
[6] Drogemuller, A., Cunningham, A., Walsh, J., Ross, W., & Thomas, B. H. (2017). VRige: exploring social network interactions in immersive virtual environments. In Proceedings of the international symposium on big data visual analytics (BDVA). IEEE NJ, USA.
[7] Oculus developers. Store Review Policies. July 2019.
https://developer.oculus.com/distribute/latest/concepts/publish-prep-app/
[8] VIVE Developers. VIVEPORT Submission Guide. July 2019.
https://developer.vive.com/resources/knowledgebase/viveport-docs-eng/
[9] Leichtnam, L., Totel, E., Prigent, N., & Mé, L. (2017, October). STARLORD: Linked security data exploration in a 3D graph. In 2017 IEEE Symposium on Visualization for Cyber Security (VizSec) (pp. 1-4). IEEE.
[10] Fransen, F., Smulders, A., & Kerkdijk, R. (2015). Cyber security information exchange to gain insight into the effects of cyber threats and incidents. e & i Elektrotechnik und Informationstechnik (Vol. 132, No. 2, pp. 106-112).
[11] The MITRE Corporation. STIX Visualization Tool. July 2019.
https://github.com/STIXProject/stix-viz/
[12] Brath, R. (2014, November). 3D InfoVis is here to stay: Deal with it. In 2014 IEEE VIS International Workshop on 3DVis (3DVis) (pp. 25-31). IEEE.
[13] Itoh, T., Takakura, H., Sawada, A., & Koyamada, K. (2006). Hierarchical visualization of network intrusion detection data. IEEE Computer Graphics and Applications (No. 2, pp. 40-47).
[14] Hideshima, Y., & Koike, H. (2006, January). STARMINE: A visualization system for cyber attacks. In Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation (Vol. 60, pp. 131-138). Australian Computer Society, Inc.
[15] Wagner Filho, J. A., Freitas, C. M. D. S., & Nedel, L. (2018, June). VirtualDesk: a comfortable and efficient immersive information visualization approach. In Computer Graphics Forum (Vol. 37, No. 3, pp. 415-426).
[16] Usher, W., Klacansky, P., Federer, F., Bremer, P. T., Knoll, A., Yarch, J., ... & Pascucci, V. (2017). A virtual reality visualization tool for neuron tracing. IEEE transactions on visualization and computer graphics (Vol. 24, No. 1, pp. 994-1003).
[17] Zhang, M. J., Li, J., & Zhang, K. (2016, December). An immersive approach to the visual exploration of geospatial network datasets. In Proceedings of the 15th ACM SIGGRAPH Conference on Virtual-Reality Continuum and Its Applications in Industry-Volume 1 (pp. 381-390). ACM.
[18] Millais, P., Jones, S. L., & Kelly, R. (2018, April). Exploring data in virtual reality: Comparisons with 2d data visualizations. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. LBW007). ACM.
[19] Chandler, T., Cordeil, M., Czauderna, T., Dwyer, T., Glowacki, J., Goncu, C., ... & Wilson, E. (2015, September). Immersive analytics. In 2015 Big Data Visual Analytics (BDVA) (pp. 1-8). IEEE.
[20] Wagner Filho, J. A., Rey, M. F., Freitas, C. M., & Nedel, L. (2018, March). Immersive visualization of abstract information: An evaluation on dimensionally-reduced data scatterplots. In 2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (pp. 483-490). IEEE.
[21] Caggianese, G., Gallo, L., & Neroni, P. (2018, June). The Vive controllers vs. Leap motion for interactions in virtual environments: A comparative evaluation. In International Conference on Intelligent Interactive Multimedia Systems and Services (pp. 24-33). Springer, Cham.
[22] Google. Tilt Brush. July 2019.
https://www.tiltbrush.com/
[23] Oasis. Cyber Observable eXpression (CybOX). July 2019.
http://cyboxproject.github.io/
[24] The MITRE Corporation. Python-stix. July 2019.
https://github.com/STIXProject/python-stix/
[25] Neo4j. Using Neo4j from Python. July 2019.
https://neo4j.com/developer/python/
[26] EclecticIQ. EclecticIQ. July 2019.
https://www.eclecticiq.com/
[27] Brooke, J. (1996). SUS-A quick and dirty usability scale. Usability evaluation in industry (Vol. 189, No. 194, pp. 4-7).
[28] Hart, S. G. (2006, October). NASA-task load index (NASA-TLX); 20 years later. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 50, No. 9, pp. 904-908). Sage CA: Los Angeles, CA: Sage publications.
[29] Saraiya, P., North, C., & Duca, K. (2005). An insight-based methodology for evaluating bioinformatics visualizations. IEEE transactions on visualization and computer graphics (Vol. 11, No. 4, pp. 443-456).
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74109-
dc.description.abstract現今的網路攻擊多變且複雜,與信任夥伴分享網路威脅情資有助於共同防禦這些攻擊。然而,目前用於分享網路威脅情資的標準格式其實非常難以探索,除非藉由視覺化工具的幫助,但傳統視覺化方法的幫助仍有限。隨著頭戴式顯示器的發展逐漸成熟,沉浸式資料視覺化有潛力提供比傳統的二維與三維視覺化方法更好的體驗。本篇論文提出了一個可以在沉浸式環境中分析網路威脅情資的互動式系統,此系統可以在虛擬實境中視覺化上萬個節點與邊,同時保持九十幅以上的高影格率。並且我們與網路安全專家合作,設計和實作了許多探索網路威脅情資的互動技巧。最後,本篇論文以兩個實驗來評估這套系統。實驗結果顯示,比起傳統的視覺化工具,受測者用此系統能夠更快地找到必要的資訊,並在系統易用性量表和工作負擔量表上的表現都更好。若是在探索已經被資安專家整理過的網路威脅情資的情況,則使用此系統和其電腦桌面對應版本的表現非常接近,但沉浸式資料視覺化造成的心理負擔較低。zh_TW
dc.description.abstractSharing cyber threat information between organizations is important to amplify the defense against sophisticated cyber attacks. However, the standard format for describing and exchanging cyber threat information is difficult to explore without the help of visualization techniques. As the head-mounted display (HMD) technology becomes more mature, immersive visualization approaches have the potential to provide better experiences. In this work, we present an interactive system for exploring cybersecurity information in the immersive environment, which utilizes the C# job system and entity component system (ECS) architecture to visualize tens of thousands of nodes and edges with a high framerate (>90 FPS). We collaborated with cybersecurity experts to design several interaction techniques based on their insights into the analysis of cyber threat information. Finally, we conducted two user studies. The results show that participants could find essential information faster using our system compared to the 2D graph visualization tool, and the system usability and user workload were also better. When exploring the cybersecurity data which has been arranged by cybersecurity experts, users could achieve similar performance using our virtual reality (VR) system and the desktop-based counterpart. Nevertheless, immersive visualization caused a lower mental workload.en
dc.description.provenanceMade available in DSpace on 2021-06-17T08:20:17Z (GMT). No. of bitstreams: 1
ntu-108-R06922025-1.pdf: 12831815 bytes, checksum: 306825b72cff2c12cbf0f4884fdaac30 (MD5)
Previous issue date: 2019
en
dc.description.tableofcontents口試委員會審定書 #
誌謝 i
中文摘要 ii
ABSTRACT iii
CONTENTS iv
LIST OF FIGURES vii
LIST OF TABLES ix
Chapter 1 Introduction 1
Chapter 2 Related Work 3
2.1 Exchanging Cyber Threat Information 3
2.2 Immersive Information Visualization 4
2.3 Interaction for Immersive Data Visualization 5
Chapter 3 Graph Visualization of STIX Data 7
3.1 Node 7
3.2 Edge 9
3.3 Layout 9
Chapter 4 Interaction Design 11
4.1 Basic Interactions 12
4.1.1 Navigation 12
4.1.2 Selecting and Highlighting 12
4.1.3 Moving a node 12
4.1.4 Calling Neighbors and Pinning 13
4.2 Multi-select Box 14
4.2.1 Creating, Deleting, and Resizing 14
4.2.2 Box Panel 15
4.2.3 Label 16
4.3 Interactive Panels 17
4.3.1 Detail Panel 17
4.3.2 Filter Panel 19
4.3.3 Time Panel 20
Chapter 5 System Overview 22
5.1 Methods 22
5.1.1 Rendering 22
5.1.2 Manipulation 23
5.2 System Workflow 24
5.2.1 Preprocessing 24
5.2.2 System Initialization 25
5.2.3 Runtime 25
Chapter 6 Evaluation 26
6.1 User Study 1: Exploring STIX Data 26
6.1.1 Experiment Design 26
6.1.2 Tasks 27
6.1.3 Participants 28
6.1.4 Procedure 29
6.1.5 Results 30
6.2 User Study 2: Analyzing Sorted STIX Data 33
6.2.1 Experiment Design 33
6.2.2 Tasks 35
6.2.3 Participants 36
6.2.4 Procedure 36
6.2.5 Results 37
Chapter 7 Discussion 41
7.1 Expanding All the Data in Virtual Environment 41
7.2 Domain Knowledge and Tasks 41
7.3 Use of the Interaction Techniques 42
Chapter 8 Conclusion 43
REFERENCES 44
dc.language.isoen
dc.subject虛擬實境zh_TW
dc.subject資料視覺化zh_TW
dc.subject沉浸式環境zh_TW
dc.subject網路安全zh_TW
dc.subjectdata visualizationen
dc.subjectvirtual realityen
dc.subjectcybersecurityen
dc.subjectimmersive environmentsen
dc.title藉由沈浸式資料視覺化與資料探索來分析網路威脅情資zh_TW
dc.titleImmersive Data Visualization and Exploration for Analyzing Cyber Threat Informationen
dc.typeThesis
dc.date.schoolyear107-2
dc.description.degree碩士
dc.contributor.oralexamcommittee莊永裕,詹力韋,林經堯
dc.subject.keyword資料視覺化,沉浸式環境,網路安全,虛擬實境,zh_TW
dc.subject.keyworddata visualization,immersive environments,cybersecurity,virtual reality,en
dc.relation.page47
dc.identifier.doi10.6342/NTU201903075
dc.rights.note有償授權
dc.date.accepted2019-08-14
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
顯示於系所單位:資訊工程學系

文件中的檔案:
檔案 大小格式 
ntu-108-1.pdf
  未授權公開取用
12.53 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved