A Survey on Immersive Cyber Situational Awareness Systems

被引:0
作者
Ahmad, Hussain [1 ]
Ullah, Faheem [2 ]
Jafri, Rehan [3 ]
机构
[1] Univ Adelaide, Sch Comp & Math Sci, Adelaide 5005, Australia
[2] Zayed Univ, Coll Interdisciplinary Studies, Dubai 144534, U Arab Emirates
[3] Honeywell, Bracknell RG12 1EB, England
来源
JOURNAL OF CYBERSECURITY AND PRIVACY | 2025年 / 5卷 / 02期
关键词
virtual reality; augmented reality; mixed reality; extended reality; cybersecurity; cyber situational awareness; cybersecurity education; cybersecurity training; REALITY; CHALLENGES;
D O I
10.3390/jcp5020033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber situational awareness systems are increasingly used for creating cyber common operating pictures for cybersecurity analysis and education. However, these systems face data occlusion and convolution issues due to the burgeoning complexity, dimensionality, and heterogeneity of cybersecurity data, which damages cyber situational awareness of end-users. Moreover, conventional forms of human-computer interactions, such as mouse and keyboard, increase the mental effort and cognitive load of cybersecurity practitioners when analyzing cyber situations of large-scale infrastructures. Therefore, immersive technologies, such as virtual reality, augmented reality, and mixed reality, are employed in the cybersecurity realm to create intuitive, engaging, and interactive cyber common operating pictures. Immersive cyber situational awareness (ICSA) systems provide several unique visualization techniques and interaction features for the perception, comprehension, and projection of cyber situational awareness. However, there has been no attempt to comprehensively investigate and classify the existing state of the art in the use of immersive technologies for cyber situational awareness. Therefore, in this paper, we have gathered, analyzed, and synthesized the existing body of knowledge on ICSA systems. In particular, our survey has identified visualization and interaction techniques, evaluation mechanisms, and different levels of cyber situational awareness (i.e., perception, comprehension, and projection) for ICSA systems. Consequently, our survey has enabled us to propose (i) a reference framework for designing and analyzing ICSA systems by mapping immersive visualization and interaction techniques to the different levels of ICSA; (ii) future research directions for advancing the state of the art on ICSA systems; and (iii) an in-depth analysis of the industrial implications of ICSA systems to enhance cybersecurity operations.
引用
收藏
页数:26
相关论文
共 72 条
[1]   Enhancing Cybersecurity with Extended Reality: A Systematic Review [J].
Abu Deeb, Fatima .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
[2]  
Alismail A., 2022, Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2022, Tirunelveli, Tamil Nadu, 67 July 2022, P761
[3]   Exploring Cybersecurity Education and Training Techniques: A Comprehensive Review of Traditional, Virtual Reality, and Augmented Reality Approaches [J].
Alnajim, Abdullah M. ;
Habib, Shabana ;
Islam, Muhammad ;
AlRawashdeh, Hazim Saleh ;
Wasim, Muhammad .
SYMMETRY-BASEL, 2023, 15 (12)
[4]   Exploring Factors Affecting User's Cybersecurity Behaviour by Using Mobile Augmented Reality App (CybAR) [J].
Alqahtani, Hamed ;
Kavakli-Thorne, Manolya .
PROCEEDINGS OF 2020 12TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2020), 2020, :129-135
[5]   Design and Evaluation of an Augmented Reality Game for Cybersecurity Awareness (CybAR) [J].
Alqahtani, Hamed ;
Kavakli-Thorne, Manolya .
INFORMATION, 2020, 11 (02)
[6]  
[Anonymous], 2024, Data Breach Investigations Report 2024
[7]  
Arogbodo M., 2022, Impacts of the COVID-19 Pandemic on Online Security Behavior Within the UK Educational Industry
[8]   A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness [J].
Ask, Torvald F. ;
Kullman, Kaur ;
Suetterlin, Stefan ;
Knox, Benjamin J. ;
Engel, Don ;
Lugo, Ricardo G. .
FRONTIERS IN BIG DATA, 2023, 6
[9]  
Barford P, 2010, ADV INFORM SECUR, V46, P3, DOI 10.1007/978-1-4419-0140-8_1
[10]  
Beitzel Steve, 2018, Proceedings of the Human Factors and Ergonomics Society Annual Meeting, V62, P2094, DOI 10.1177/1541931218621472