Affiliation:
1. Cyber Security Centre, WMG, University of Warwick, Coventry CV4 7AL, UK
2. School of Computing, Birmingham City University, SteamHouse, Belmont Row, Birmingham B4 7RQ, UK
Abstract
As technology advances and cyber threats become increasingly sophisticated, the task of recognising and understanding malicious activities becomes more complex. This persistent issue is widely acknowledged and extensively documented within the cybersecurity community. Attack modelling techniques (AMTs), such as attack graphs, have emerged as valuable tools in aiding cyberattack perception. These visualisation tools offer crucial insights into the complex relationships between various components within a system or network, shedding light on potential attack paths and vulnerabilities. This paper proposes an attack graph visual syntax method to improve cyberattack perception among experts and non-experts. The proposed approach was developed to streamline complexity and enhance clarity, thus augmenting the interpretability for users by enhancing visual structural components, such as hue, chromaticity, and line parameters. The proposed attack graph (pag) was empirically evaluated against the adapted attack graph (aag) presented in the literature. The empirical evaluation (n = 83) was conducted through a 3 × 2 × 2 factorial design and two-way analysis of variance (ANOVA) with repeated measures. The participants were classified according to their respective background cohorts into expert and non-expert (expert n = 37, non-expert n = 46) and then grouped into two groups: proposed attack graph (pag) and adapted attack graph (aag) (pag n = 41, aag n = 42). The empirical results demonstrated that while the proposed attack graph (pag) implemented various visual modifications such as brighter hues, denser line structures, and varied shapes, these enhancements did not significantly improve the perception of cyberattacks among individuals who lack expertise in the field, including corporate executives. Moreover, the use of variables such as colour, tone, and line width/density/structure did not help objects in the graph be distinguished more effectively. This paper provides significant insights into the impact of visual enhancements on cyberattack perception, highlighting that visual enhancements alone may not be sufficient to improve cyberattack perception for individuals lacking expertise in the field.
Reference47 articles.
1. An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception;Lallie;IEEE Trans. Inf. Forensics Secur.,2017
2. The rise in cybercrime and the dynamics of exploiting the human vulnerability factor;Conteh;Int. J. Comput. (IJC),2016
3. Morgan, S. (2016). Why Ceos Are Failing Cybersecurity, and How to Help Them Get Passing Grades, Forbes.
4. From weakest link to security hero: Transforming staff security behavior;Pfleeger;J. Homel. Secur. Emerg. Manag.,2014
5. Human factor, a critical weak point in the information security of an organization’s internet of things;Li;Heliyon,2021