Abstract
Visualization tools are critical components of cyber security systems allowing analyzers to better understand, detect and prevent security breaches. Security administrators need to understand which users accessed the database and what operations were performed in order to detect irregularities. The current work compares the Sankey diagram with the more commonly used node-link diagram as an alternative visualization technique for cyber security tasks in a controlled experiment. The results indicate, that the Sankey tool showed a consistent advantage in task completion time and was more effective (measured by the percent of correct answers) in synoptic tasks, while the Node-link diagram was more effective in basic, elementary tasks. Further results revealed that performance had only a small effect on user satisfaction and preferences. Our results suggest that the Sankey tool may be a viable option for cyber security visualization tools and strengthens the need to provide personalized visualization tools based on user preferences.
Original language | English |
---|---|
Title of host publication | Human-Computer Interaction – INTERACT 2019 - 17th IFIP TC 13 International Conference, Proceedings |
Editors | David Lamas, Fernando Loizides, Lennart Nacke, Helen Petrie, Marco Winckler, Panayiotis Zaphiris |
Publisher | Springer Verlag |
Pages | 497-518 |
Number of pages | 22 |
ISBN (Print) | 9783030293802 |
DOIs | |
State | Published - 2019 |
Event | 17th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2019 - Paphos, Cyprus Duration: 2 Sep 2019 → 6 Sep 2019 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 11746 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 17th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2019 |
---|---|
Country/Territory | Cyprus |
City | Paphos |
Period | 2/09/19 → 6/09/19 |
Bibliographical note
Publisher Copyright:© IFIP International Federation for Information Processing 2019.
Keywords
- Cyber security
- Sankey diagram
- Visualization
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science