A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Visual analytics for network security
2012
2012 IEEE Conference on Visual Analytics Science and Technology (VAST)
Custom-made Python scripts are used for data preprocessing purposes. In this work, we show how visualization tools may be combined to leverage network forensic analysis tasks. ...
To visualize the VAST 2012 Mini Challenge 2 datasets, we use the InfoVis Toolkit (IVTK). Custom visualizations as well as extra interaction capabilities have been added to the toolkit. ...
Interactive visual analytics tools allow security analysts to examine network activity and detect abnormal events with ease. ...
doi:10.1109/vast.2012.6400506
dblp:conf/ieeevast/ShurkhovetskyyBG12
fatcat:hcw2cya7n5esppivcllasp3b7m
Visual Analytics for Network Security and Critical Infrastructures
[chapter]
2017
Lecture Notes in Computer Science
Our research is focused on designing new exploratory methods and interactive visualizations in the context of network security. ...
The knowledge generation loop is important for its ability to help analysts to refine the nature of the processes that continuously occur and to offer them a better insight into the network security related ...
This research was supported by the Security Research Programme of the Czech Republic 2015-2020 (BV III/1 VS) granted by the Ministry of the Interior of the Czech Republic under No. ...
doi:10.1007/978-3-319-60774-0_13
fatcat:hb4yivvmcrgwtdrn36h5wy54wu
Flexible web visualization for alert-based network security analytics
2013
Proceedings of the Tenth Workshop on Visualization for Cyber Security - VizSec '13
This paper describes a web-based visualization system designed for network security analysts at the U.S. Army Research Laboratory (ARL). ...
Our goal is to provide visual support to the analysts as they investigate security alerts for malicious activity within their systems. ...
BACKGROUND Visualization has been proposed as an important component of network security analytics [2, 13, 20] . ...
doi:10.1145/2517957.2517962
dblp:conf/vizsec/HaoHH13
fatcat:dmf33uw3ifbqfi3wiepzxnteou
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment
[chapter]
2013
Lecture Notes in Computer Science
To illustrate the framework, we developed a SIEM visualization component VisSecAnalyzer. The paper demonstrates its possibilities for the tasks of attack modeling and security assessment. ...
Visualization is the essential part of Security Information and Event Management (SIEM) systems. ...
This research is being supported by grant of the Russian Foundation of Basic Research (project #13-01-00843-a), Program of fundamental research of the Department for Nanotechnologies and Informational ...
doi:10.1007/978-3-642-40588-4_24
fatcat:4beolijxzne23mebft3zoojg4u
Visual Analytics for Network Flow Analysis
2009
2009 Cybersecurity Applications & Technology Conference for Homeland Security
W e have integrated our visual analytics toolkit w ith netw ork flow data to provide a seamless workflow for computer network defense analysts. ...
Cybersecurity Applications & Technology Conference For Homeland Security 978-0-7695-3568-5/09 $25.00 ...
This paper focuses on the integration of the visual analytics with a network flow analysis system, SiLK, the System for Internet-Level Knowledge. ...
doi:10.1109/catch.2009.47
fatcat:fe5umpmso5bgplpudhdly2nsk4
NetSecRadar: A real-time visualization system for network security: VAST 2012 Mini Challenge. Award: Honorable mention for interesting use of radial visualization technique
2012
2012 IEEE Conference on Visual Analytics Science and Technology (VAST)
3 :Figure 4 : 34 Overview of network security at one moment (left); Alerts filtered by workstation. ...
INTRODUCTION
VISUAL AND INTERACTION DESIGN
Hosts and Alert types
Attack Correlation and Interaction Figure 1 : 1 Initial design for our visualization system. ...
doi:10.1109/vast.2012.6400516
dblp:conf/ieeevast/ZhaoZS12
fatcat:3a6ux77vbvbaban43r63xgdhku
Visualizing Traffic Causality for Analyzing Network Anomalies
2015
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics - IWSPA '15
We design and develop a tool to visually represent the causal relations for network requests. ...
Our tool with a special visual locality property supports different levels of visualbased querying and reasoning required for the sensemaking process on complex network data. ...
As our tool is to visualize the network requests for security purposes, it is not built for the average users. ...
doi:10.1145/2713579.2713583
dblp:conf/codaspy/ZhangSYN15
fatcat:yobkjzt2xvgdloe723kvislpcy
Visual analysis for live LIDAR battlefield change detection
2008
Defense and Security 2008: Special Sessions on Food Safety, Visual Analytics, Resource Restricted Embedded and Sensor Networks, and 3D Imaging and Display
We present the framework for a battlefield change detection system that allows military analysts to coordinate and utilize live collection of airborne LIDAR range data in a highly interactive visual interface ...
Finally, the cycle is completed by the generation of a goal map for the LIDAR collection hardware that instructs as to which areas should be sampled next in order to best advance the change detection task ...
Fig. 4 . 4 An example of an interactive visualization environment for analysis of detected change models. ...
doi:10.1117/12.777158
fatcat:zac42jxr6fa6vbm4fc6gxdisly
Visualizing uncertainty for geographical information in the global terrorism database
2008
Defense and Security 2008: Special Sessions on Food Safety, Visual Analytics, Resource Restricted Embedded and Sensor Networks, and 3D Imaging and Display
Traditional uncertainty visualization techniques, such as those that change primitive attributes or employ animation, can create large amounts of clutter or actively distract when visualizing geospatially ...
network depicted by geopolitical maps. ...
Squarified treemaps form the basis for our technique because they allow for quick visual comparison between all, rather than only the dominant, members of a distribution. ...
doi:10.1117/12.777695
fatcat:pujip36eqnapdbbuso5w6bteqi
Modified pressure system for imaging egg cracks
2008
Defense and Security 2008: Special Sessions on Food Safety, Visual Analytics, Resource Restricted Embedded and Sensor Networks, and 3D Imaging and Display
These times could easily be reduced with a compiled program specifically written for the application. ...
In analyzing 1000 eggs, the system was 99.6% accurate overall with only 0.3% false positives, compared to 94.2% accurate overall for the human graders with 1.2% false positives. ...
Alan Savage for help in constructing the chamber, and Ms. Patsy Mason for developing a method to micro-crack shell eggs. ...
doi:10.1117/12.786864
fatcat:s7iidgrcm5ejlapig3ddttpxke
Visual Analytics for cyber security and intelligence
2014
The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology
The VA requirements are described for the cyber security and intelligence for counterterrorism application domains, along with promising research projects and commercial software. ...
First, we introduce the important scientific visualization, interaction and reasoning concepts supporting VA. Then, we present some visual analytics advanced techniques. ...
ACKNOWLEDGMENTS The authors wish to thank DRDC CSS (Centre for Security Sciences), in particular Mr Andrew Vallerand and Mr Jack Pagotto, for their indefectible interest in R&D work in Visual Analytics ...
doi:10.1177/1548512912464532
fatcat:qxmkcqgp7fdlxkh7b3zeptetum
Visual Analytics: Towards Intelligent Interactive Internet and Security Solutions
[chapter]
2012
Lecture Notes in Computer Science
Visual Analytics is an enabling technology, that offers new ways of extracting information from Big Data through intelligent, interactive internet and security solutions. ...
Besides discussing the origins of Visual Analytics, this paper presents concrete examples of how the two facets, content and infrastructure, of the Future Internet can benefit from Visual Analytics. ...
Visual Analytics for Network Infrastructure The growing complexity of network infrastructure cries out for more analytical support on both the automated side as well as on the human side. ...
doi:10.1007/978-3-642-30241-1_9
fatcat:jepv6mvrgbdxne7ub7odzuxzya
Towards Visual Cyber Security Analytics for the Masses
[article]
2018
Eurographics Conference on Visualization
With this paper, we want to share our vision of cyber security analytics becoming an accessible everyday task through visual analysis tools. ...
We present an open, accessible and user-friendly visual network analyzer for PCAP (packet capture) files, critically discuss our first prototype, and give an outlook to anomaly detection supported by active ...
An approach to visual cyber security analytics for general users with a description of the target group's requirements. 2. ...
doi:10.2312/eurova.20181113
dblp:conf/vissym/UlmerSLKK18
fatcat:mlw6tzfhfngzthubjgj53isdku
A Study Towards Post Hoc Forensic Analysis Using Big Data Analytics
2018
CVR Journal of Science & Technology
It is more focused on the techniques and associated tools for use of big data analytics for security and use of information security algorithms to protect big data. ...
There is a well understood discussion about the security challenges of big data including big data privacy issues, data provenance problems and visual analytics. ...
Big data visualization and analytic techniques are useful to analyze the huge network data available in the storage hub to address cyber security [2, 11] . ...
doi:10.32377/cvrjst1413
fatcat:tw6zhqpwozhb7pdha3dcezgigy
BANKSAFE: Visual analytics for big data in large-scale computer networks
2013
Information Visualization
BANKSAFE is based on modern database technologies and is capable of visually analyzing vast amounts of monitoring data and security-related datasets of large-scale computer networks. ...
Additionally, we discuss lessons learned during the design and development of BANKSAFE, which are also applicable to other visual analytics applications for big data. ...
architectures. 28 There is some effort, for example, in the VIS-SENSE project, to design a visual analytics framework for security-related datasets. ...
doi:10.1177/1473871613488572
fatcat:7wlsyhq3m5hlta2xmtpm6lpq2u
« Previous
Showing results 1 — 15 out of 119,313 results