Enhancing Cyber Situational Awareness Through Dynamic Adaptive Symbology: The DASS Framework
Abstract
1. Introduction
- A Novel Framework for Adaptive Symbology: We present the complete architecture and implementation details of the DASS, a system designed to translate complex, real-time cyber events into an intuitive visual language. The DASS dynamically adjusts symbol attributes (size, color, shape) based on a threat’s severity and context, moving beyond the static limitations of current standards.
- A Detailed Implementation Methodology: We outline the system’s multi-layered software architecture, its integration mechanisms with external security tools (via APIs and log parsing), and its event management processes, providing a blueprint for developing similar adaptive visualization systems.
- Empirical Validation Against an Industry Standard: We provide a rigorous, within-subjects experimental evaluation of the DASS, directly comparing its performance with a baseline system representing the MIL-STD-2525D philosophy. This validation was conducted with active cybersecurity professionals, ensuring operational relevance.
- Quantifiable Improvements in Operator Performance and Cognitive Load: Our findings demonstrate that the DASS delivers significant and measurable improvements, including a 30% increase in threat identification speed and a 25% reduction in decision-making time. Furthermore, using the NASA-TLX, we quantify the reduction in operator cognitive load and frustration, a critical factor in high-pressure security environments [10,11].
2. Related Work
2.1. Recent Advances in Cyber Visual Analytics
2.2. Limitations of Traditional Symbology and the Need for Adaptation
2.3. Adaptive Systems and Cognitive Load Management
3. The DASS Framework: Architecture and Implementation
3.1. Modular Architecture
- Graphical User Interface (GUI): The GUI serves as the central control hub, replacing traditional log-based dashboards with an intuitive, visual representation of the cyber landscape. Developed using Python’s Tkinter framework, it is designed to be fully interactive and adaptive, allowing analysts to zoom, filter, and manipulate threat displays for focused analysis. Its adaptive alert system uses color-coding and other visual cues to ensure clear prioritization of critical threats.
- Threat Detection Engine: This component is responsible for analyzing network traffic, identifying suspicious activities, and classifying threats. It employs a hybrid detection methodology, combining rule-based signature detection for known threats with behavioral analytics to identify deviations from normal network activity that may indicate emerging threats [24]. This dual-layered approach enables the DASS to detect both known and novel threats proactively, minimizing false positives and providing categorized, prioritized inputs to the Symbology Renderer.
- Task-Oriented Symbology Renderer: This is the core visualization engine of the DASS. It receives classified threat data from the detection engine and dynamically adjusts the visual representation of cyber assets in real time. It automatically modifies the size, color, shape, and opacity of symbols based on a threat’s severity, persistence, and operational context. This functionality ensures that security operators can quickly interpret critical events with greater efficiency and accuracy, focusing their attention where it is most needed.
- Scalability and Integration Framework: This expansion module ensures the DASS’s long-term viability and interoperability. Crucially, it incorporates a Data Processing Unit (DPU) that filters, prioritizes, and suppresses noisy or low-value alerts to mitigate operator overload. It is designed to allow seamless integration with third-party cybersecurity tools, such as Security Information and Event Management (SIEM) and Intrusion Detection Systems (IDSs), via custom APIs. The framework supports both cloud and on-premises deployment options and ensures that modular enhancements do not compromise system performance, making the DASS a future-proof solution [23].
3.2. System Implementation and Integration
3.2.1. Software Architecture
- Presentation Layer: This is the GUI, developed in Tkinter 8.5, which enables users to interact with the system, manipulate symbology settings, and visualize cyber threats. It is designed for high responsiveness to ensure immediate feedback for user actions.
- Application Layer: This layer houses the core functionalities, including the Threat Detection Engine, Symbology Renderer, and data processing logic. It manages interactions between all system modules and includes APIs that facilitate efficient data flow between layers.
- Data Layer: This layer is responsible for ingesting, storing, and filtering real-time security data from various sources. It is optimized for handling large-scale security logs and uses both SQL and NoSQL databases for structured and high-velocity data, respectively.
3.2.2. System Integration
- API Connectivity: The DASS utilizes RESTful APIs to pull real-time data from external security platforms like SIEMs and IDSs, supporting both JSON and XML data formats for broad compatibility.
- Log File Parsing: The system can integrate with log files from network monitoring tools, using a custom parser to standardize diverse log formats for uniform processing and analysis.
3.2.3. Performance and Computational Overhead
3.2.4. Symbol Processing and Event Management
4. Experimental Design and Evaluation
4.1. Operational Framework and Experimental Procedure
- Phase 1: Baseline Environment (MIL-STD-2525D): Participants first interacted with a static cyber visualization framework serving as a baseline (Figure 2). This environment presented a fixed cyber map with unchangeable symbols and no dynamic feedback. This phase established a performance baseline and highlighted the cognitive burden of manually interpreting static data.
- Phase 2: Experimental Environment (DASS): Following the baseline, users transitioned to the interactive DASS environment. They were tasked with first building a custom cyber map using the interface shown in Figure 3, and then responding to a simulated virus infection. This phase included the following:
- -
- Cyber Map Construction: Users built a custom cyber environment by placing IT assets (e.g., computers, servers, users) onto a canvas.
- -
- Scenario-Based Threat Simulation: Users triggered a cyberattack simulation to test the DASS’s real-time adaptability.
- -
- Real-Time Adaptive Symbology: The system dynamically updated symbols to represent threat escalation and severity.
4.2. Evaluation Methodology and Performance Metrics
- Threat Recognition Rate: This metric measured operator accuracy by calculating the percentage of correctly identified threats against the total number of threats presented in the test scenario. Participants were evaluated on their ability to recognize and classify virus events using the symbology provided in each environment.
- Response Time Improvement: The time taken by participants to detect, categorize, and decide on a response to a threat was recorded using timestamps. This allowed for a direct, quantitative comparison of reaction times between the dynamic DASS environment and the static baseline.
- Symbol Interpretation Accuracy: To assess symbol clarity, participants were asked to match symbology elements to predefined threat categories and severity levels. This measured how effectively each system conveyed critical information without ambiguity.
- Operator Cognitive Load: The perceived difficulty and mental strain of using each system were measured using the NASA Task Load Index (NASA-TLX). This multi-dimensional tool assesses workload across six subscales: Mental Demand, Physical Demand, Temporal Demand, Performance, Effort, and Frustration [11].
- Cyber Map Effectiveness: A structured post-task questionnaire was used to gather qualitative feedback. Users rated their ability to derive insights, understand threat evolution, and maintain situational awareness in each environment.
5. Results
5.1. Quantitative Performance Analysis
- Threat Identification Speed: Participants using the DASS were, on average, 30% faster at identifying threats.
- Response Time: Decision-making was 25% faster in the DASS environment.
- Symbol Interpretation Accuracy: The DASS achieved a high accuracy rate of 90%.
5.2. Cognitive Load and Usability Feedback
5.3. Individual Participant Analysis
6. Discussion
7. Conclusions and Future Work
- Phase 1: Prototype Refinement and Feature Expansion: This phase will focus on expanding support for additional cyber threats (e.g., ransomware, phishing), improving symbol generation algorithms, and optimizing the user interface based on operator feedback.
- Phase 2: Pilot Deployment in Controlled Environments: This will involve deploying the DASS in a closed cybersecurity network for real-world testing with security professionals and establishing integration pathways with SIEM/IDS solutions.
- Phase 3: Full-Scale Enterprise Integrations: This phase will expand the DASS to support large-scale security operations, including deployment across enterprise teams and enabling real-time event correlation with external tools. This will necessitate optimization for high-volume, real-time logs, including the implementation of features like load balancing and distributed processing.
- Phase 4: Continuous Optimization and AI-Driven Enhancements: The final phase will focus on establishing the DASS as a self-improving tool by integrating machine learning models to refine symbology dynamically and develop real-time threat prediction capabilities.
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Abomhara, M.; Køien, G.M. Cybersecurity and the Internet of Things: Vulnerabilities, Threats, Intruders, and Attacks. J. Cybersecur. 2015, 1, 65–88. [Google Scholar]
- Ali, M.; Smith, S. Multi-Layered Network Defense: A Visualization Framework for Real-Time Threat Monitoring. Comput. Secur. 2019, 83, 232–245. [Google Scholar]
- Heer, J.; Shneiderman, B. Interactive Dynamics for Visual Analysis. Queue 2012, 10, 2. [Google Scholar] [CrossRef]
- Schooley, B.; Hansen, D.; Richmond, E.J.; Canite, M.J.; Huaira Reyna, N.M. Visualizing Cybersecurity Diagrams: An Empirical Analysis of Common Weakness Enumeration Images. In HCI for Cybersecurity, Privacy and Trust; Moallem, A., Ed.; HCII 2024, Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2024; Volume 14728. [Google Scholar]
- Department of Defense. MIL-STD-2525D: Joint Military Symbology; Technical Report; Department of Defense: Arlington, VA, USA, 2014. [Google Scholar]
- ENISA. ENISA Threat Landscape 2021; Technical Report; European Union Agency for Cybersecurity: Athens, Greece, 2021. [Google Scholar]
- Cunningham, R.; Duggan, D. Cyber Situational Awareness: Visualizing Vulnerabilities and Threat Relationships. IEEE Syst. J. 2018, 12, 2510–2518. [Google Scholar]
- Chandra, R.; Singh, A. Cognitive Workload and Information Overload in Cyber Operations: Solutions and Strategies. Hum. Factors J. Hum. Factors Ergon. Soc. 2020, 62, 1041–1058. [Google Scholar]
- Moore, A.; Neuman, C. Cognitive Load and Adaptive Interfaces in Cybersecurity. J. Hum.-Comput. Interact. 2021, 37, 245–261. [Google Scholar]
- Ben-Asher, N.; Gonzalez, C. Effects of Cyber Security Knowledge on Attack Detection. Comput. Hum. Behav. 2015, 48, 51–61. [Google Scholar] [CrossRef]
- Lin, C.; LaPorte, J. Human Factors in Cybersecurity: Adaptive Systems and Cognitive Load Management. IEEE Trans. Hum.-Mach. Syst. 2020, 50, 342–357. [Google Scholar]
- Franke, U.; Brynielsson, J. Cyber situational awareness—A systematic review of the literature. Comput. Secur. 2014, 46, 18–31. [Google Scholar] [CrossRef]
- Carpendale, S.; Montanari, F. Designing Adaptive Visualizations for Decision-Making in Cybersecurity. Inf. Vis. 2021, 20, 289–308. [Google Scholar]
- Cummings, M.L.; Guerlain, S. Human-Centered Cybersecurity Interfaces: Challenges in Adaptive Design. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 5193–5205. [Google Scholar]
- Wang, Y.; Guo, D.; Li, S.; Camps, O.; Fu, Y. Explainable Anomaly Detection in Images and Videos: A Survey. arXiv 2023, arXiv:2302.06670. [Google Scholar]
- Nikolov, G.; Perez, A.; Mees, W. Evaluation of Cyber Situation Awareness—Theory, Techniques and Applications. In Proceedings of the 19th International Conference on Availability, Reliability and Security (ARES ’24), Vienna, Austria, 30 July–2 August 2024; Association for Computing Machinery: New York, NY, USA, 2024; pp. 1–10. [Google Scholar] [CrossRef]
- Capobianco, F.; George, R.; Huang, K.; Jaeger, T.; Krishnamurthy, S.; Qian, Z.; Payer, M.; Yu, P. Employing Attack Graphs for Intrusion Detection. In Proceedings of the New Security Paradigms Workshop; Association for Computer Machinery (ACM): Windsor, UK, 2019; pp. 16–30. [Google Scholar]
- Alavizadeh, H.; Jang-Jaccard, J.; Enoch, S.Y.; Al-Sahaf, H.; Welch, I.; Camtepe, S.A.; Kim, D.D. A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights. ACM Comput. Surv. 2022, 55, 107. [Google Scholar] [CrossRef]
- Shiravi, H.; Shiravi, A.; Ghorbani, A.A. A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph. 2012, 18, 1194–1215. [Google Scholar] [CrossRef] [PubMed]
- Lakkaraju, K.; Yurcik, W.; Lee, A.J. NVisionIP: NetFlow Visualizations of System and Network Security. In Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSec), Washington, DC, USA, 29 October 2004; pp. 65–72. [Google Scholar]
- Gartner. Designing an Adaptive Security Architecture for Protection From Advanced Attacks; Technical Report; Gartner: Stamford, CT, USA, 2016. [Google Scholar]
- Holland, J.H. Adaptation in Natural and Artificial Systems; MIT Press: Cambridge, MA, USA, 1992. [Google Scholar]
- National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018. [Google Scholar]
- Theoharidou, M.; Gritzalis, D. A Multi-Layered Security Architecture for Real-Time Monitoring and Threat Detection. Int. J. Inf. Secur. 2017, 16, 287–302. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Macrino, N.; Pallas Enguita, S.; Chen, C.-H. Enhancing Cyber Situational Awareness Through Dynamic Adaptive Symbology: The DASS Framework. Sensors 2025, 25, 6300. https://doi.org/10.3390/s25206300
Macrino N, Pallas Enguita S, Chen C-H. Enhancing Cyber Situational Awareness Through Dynamic Adaptive Symbology: The DASS Framework. Sensors. 2025; 25(20):6300. https://doi.org/10.3390/s25206300
Chicago/Turabian StyleMacrino, Nicholas, Sergio Pallas Enguita, and Chung-Hao Chen. 2025. "Enhancing Cyber Situational Awareness Through Dynamic Adaptive Symbology: The DASS Framework" Sensors 25, no. 20: 6300. https://doi.org/10.3390/s25206300
APA StyleMacrino, N., Pallas Enguita, S., & Chen, C.-H. (2025). Enhancing Cyber Situational Awareness Through Dynamic Adaptive Symbology: The DASS Framework. Sensors, 25(20), 6300. https://doi.org/10.3390/s25206300