Skip to main content

Towards More Effective Cyber Operator Interfaces Through Semantic Modeling of User Context

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 501))

Abstract

Cyber operators frequently need to quickly process large amounts of data that are generated by various network monitoring systems or applications, and they need to rapidly make complex decisions. We posit that dynamically tailoring the user experience to the cyber operator’s context would significantly improve the effectiveness and efficiency of their ability to respond and take action. Tailoring can take the form of filtering to present the information most relevant to the situation, or automating tasks that are most beneficial in the current context. SRI’s bright ( www.sri.com/bright) approach records the action and gaze details of cyber operator interactions across several cyber security applications. Analysis of the collected data will provide insight into the current interests of cyber operators, and form the basis for future methods and mechanisms for adapting the user experience.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.youtube.com/watch?v=HL4bDWYvtCw

  2. 2.

    http://www.bothunter.net/

References

  1. Erbacher, R.F., Frincke, D.A., Wong, P.C., Moody, S., Fink, G.: Cognitive task analysis of network analysts and managers for network situational awareness. IS&T/SPIE Electronic Imaging, pp. 75300H–75300H. International Society for Optics and Photonics (2010)

    Google Scholar 

  2. Erbacher, R.F., Frincke, D.A., Wong, P.C., Moody, S., Fink, G.: A multi-phase network situational awareness cognitive task analysis. Inf Vis 9(3), 20–219 (2010)

    Article  Google Scholar 

  3. Mahoney, S., Roth, E., Steinke, K., Pfautz, J., Wu, C., Farry, M.: A cognitive task analysis for cyber situational awareness. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 54(4), pp. 279–283. SAGE Publications (2010)

    Google Scholar 

  4. D’Amico, A., Whitley, K., Tesone, D., O’Brien, B., Roth, E.: Achieving cyber defense situational awareness: a cognitive task analysis of information assurance analysts. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 49(3), pp. 229–233, SAGE Publications (2005)

    Google Scholar 

  5. D’Amico, A., Whitley, K.: The real work of computer network defense analysts. In: IEEE Symposium on Visualization for Cyber Security (VizSEC 2007), pp. 19–37. Springer Berlin Heidelberg (2008)

    Google Scholar 

  6. Klein, G., Tolle, J., Martini, P.: From detection to reaction-a holistic approach to cyber defense. In: Defense Science Research Conference and Expo (DSR), pp. 1–4. IEEE (2011)

    Google Scholar 

  7. Jajodia, S., Liu, P., Swarup, V., Wang, C.: Cyber situational awareness, vol. 14. NY, Springer, New York (2010)

    Book  MATH  Google Scholar 

  8. Barford, P., Dacier, M., Dietterich, T.G., Fredrikson, M., Giffin, J., Jajodia, S., Jha, S., Li, J., Liu, P., Ning, P., Ou, X.: Cyber SA: situational awareness for cyber defense. In Cyber Situational Awareness, pp. 3–13. Springer US (2010)

    Google Scholar 

  9. Liu, P., Jia, X., Zhang, S., Xiong, X., Jhi, Y.-C., Bai, K., Li, J.: Cross-layer damage assessment for cyber situational awareness. In: Cyber Situational Awareness, pp. 155–176. Springer (2010)

    Google Scholar 

  10. Yen, J., McNeese, M., Mullen, T., Hall, D., Fan, X., Liu, P.: RPD-based hypothesis reasoning for cyber situation awareness. In: Cyber Situational Awareness, pp. 39–49. Springer (2010)

    Google Scholar 

  11. He, H., Xiaojing, W., Xin, Y.: A decision-support model for information systems based on situational awareness. In: International Conference on Multimedia Information Networking and Security MINES’09, vol. 2, pp. 405–408. IEEE (2009)

    Google Scholar 

  12. He, H., Shuping, Y., Peng, W.: Security decision making based on domain partitional markov decision process. In: International Conference on Information Engineering and Computer Science, ICIECS 2009, pp. 1–4, IEEE (2009)

    Google Scholar 

  13. Cheng, Y., Sagduyu, Y., Deng, J., Li, J., Peng, L.: Integrated situational awareness for cyber-attack detection, analysis, and mitigation. In SPIE Defense, Security, and Sensing, pp. 83850N–83850N. International Society for Optics and Photonics (2012)

    Google Scholar 

  14. Preden, J., Motus, L., Meriste, M., Riid, A.: Situation awareness for networked systems. In: IEEE First International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2011), pp. 123–130, IEEE (2011)

    Google Scholar 

  15. Lacy, T.H., Mills, R.F., Raines, R.A., Williams, P.D., Rogers, S.K.: A qualia framework for awareness in cyberspace. In: Military Communications Conference (MILCOM 2007), pp. 1–7, IEEE (2007)

    Google Scholar 

  16. Boyce, M. W., Duma, K. M., Hettinger, L. J., Malone, T. B., Wilson, D. P., Lockett-Reynolds, J.: Human performance in cybersecurity a research agenda. In: Proceedings of the Human Factors and Ergonomics Society annual meeting, vol. 55(1), pp. 1115–1119. SAGE Publications (2011)

    Google Scholar 

  17. Salas, E., Rosen, M.A., Burke, C.S., Nicholson, D., Howse, W.R.: Markers for enhancing team cognition in complex environments: the power of team performance diagnosis. Aviat. Space Environ. Med. 78(Supplement 1), B77–B85 (2007)

    Google Scholar 

  18. Jones, R. M., O’Grady, R., Nicholson, D., Hoffman, R., Bunch, L., Bradshaw, J., Bolton, A.: Modeling and integrating cognitive agents within the emerging cyber domain. In Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC) (2015)

    Google Scholar 

Download references

Acknowledgments

We would like to thank our colleague Reginald Ford for providing constructive feedback that improved readability of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rukman Senanayake .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Senanayake, R., Denker, G. (2016). Towards More Effective Cyber Operator Interfaces Through Semantic Modeling of User Context. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41932-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41931-2

  • Online ISBN: 978-3-319-41932-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics