Attack Map

Visualizing cyber threats in real time

Desktop | Year 2025

My Role UX & UI design

Overview

Cyber security product that aggregates security logs and data from various sources, including endpoints, gateways, and cloud services, to provide security administrators with a comprehensive view of their organization’s security posture. Its primary goal is to present consolidated data in a clear and efficient manner, enabling users to understand cross-platform attacks. When investigating a specific incident, users can utilize the attack map to visualize compromised assets and the sequence of events during the attack.

The Challenge

  • High Volume of Entities – Users struggled to interpret a large number of entities and understand their relationships.

  • Lack of Visual Differentiation – It was difficult to distinguish between various asset types and attack types.

  • Missing Attack Timeline – Due to technical limitations, users couldn’t view the chronological flow of attacks, making investigations harder.

The Goal

  • Logical Grouping – Structure entities into clear, meaningful groups to enhance comprehension.

  • Defined Group Behavior – Establish consistent rules for how entity groups expand, collapse, and display their contents.

  • Support Investigation Paths – Add contextual links and navigation options to help users follow the flow of an attack across the system.

Attack Map – Visualizing Entity Relationships and Threat Flow

The attack map visualizes all entities involved in an attack and their connections.

  • Assets are displayed as squares in a neutral color, representing internal entities within the organization’s network.

  • Indicators & Artifacts are external entities shown as circles.

    • Indicators are malicious entities, color-coded by severity.

    • Artifacts are neutral entities, displayed in gray.

  • Each entity includes an icon that represents its type and a label displaying its name.

  • Connections represent insights (alerts) that form the structure of the attack; multiple insights can exist between the same two entities.

  • A mini-map is available to help users navigate large-scale maps that extend beyond the visible screen.

Entity Grouping Behavior – Improving Map Readability

Entities are grouped by asset type and indicator type to improve initial readability and reduce visual clutter.

  • Group Presentation: Each group includes an icon, a label summarizing the number of entities inside, and an arrow icon to expand or collapse the group.

  • Group Expansion: When a group contains many entities and is expanded, the map automatically zooms out, showing all elements in a compact, spaced layout to maintain clarity and context.

Spacing & Scaling Logic for Large Attack Maps

The smaller image defines the spacing system used when expanding large groups of entities within the attack map. It outlines the horizontal and vertical gaps (40–88px) between items to maintain readability and avoid visual overload. Additionally, a minimum zoom threshold (50%) is applied to start showing tooltips—ensuring labels remain legible without crowding the screen. These guidelines help maintain a clean structure and scalable layout even when displaying over 100 indicators, as seen in the main screen.

Tooltip Design – Spacing & Readability

This tooltip was designed to display long, complex values clearly—like suspicious URLs. I added detailed spacing guidelines to help developers implement it accurately and consistently, ensuring it stays readable across all screen sizes and zoom levels.

Usability Testing Summary – Attack Map

Participants: Testing was conducted with 3 users actively interacting with the attack map.

Navigation

  • The overall placement of elements was clear and easy to locate.

  • However, navigation to affected assets and related insights was not intuitive—existing links were either overlooked or unclear.

Grouping

Participants found that most maps were small and didn’t necessarily require grouping, which added unnecessary steps in some cases.

Investigation Capabilities

  • Pivot Options: Users expected the ability to pivot directly into Threat Hunting, Threat Intelligence, or to add an entity to the IOC list.

  • Indications: There were no visual indicators for isolated assets or actions that had already been taken for remediation.

Filters & Visual Cues

  • Counters: Filter counters lacked clarity and were sometimes overlooked.

  • Severity Differentiation: The distinction between indicator severity and insight severity was not clearly understood.

Overall Understanding

  • Chronological Flow: Users expected to see the sequence of events but noted this was missing.

  • Connectors: Connections between entities were unclear in terms of how they represented the progression or logic of the attack.

Key Fixes Implemented Based on Usability Feedback

Overall Understanding

  • Chronological flow: Adding timeline chart and list will allow users to understand better the attack.

  • Connectors: We’ve create a visual distinction between 2 different types of connections- communication & association. Communication is between 2 assets (devices & users) and association is between an asset and an indicators (like file, URL, process).

Grouping

Default Grouping: Removed default grouping as most maps appear small and do not require it. 

Investigation

  • Pivot Options: Added links and actions in the tooltip for entities to pivot to Threat Hunting, Intelligence, and add to IOC.

  • Isolation Information: Added tooltip with information on the indications with information on the indication about the attack and if it was isolated.

Filters & Visual Cues

  • Counters: Removed counters from the title and presented them only within the filters.

  • Severity Differences: Displayed the number of insights to indicate the presence of a tooltip, where users can find severity information.

Interactive Prototype Walkthrough

Explore more projects

Cyber system optimization

Green Leaf Plant Store