Filters








119,313 Hits in 2.9 sec

Visual analytics for network security

Georgiy Shurkhovetskyy, Ahmed Bahey, Mohammad Ghoniem
2012 2012 IEEE Conference on Visual Analytics Science and Technology (VAST)  
Custom-made Python scripts are used for data preprocessing purposes. In this work, we show how visualization tools may be combined to leverage network forensic analysis tasks.  ...  To visualize the VAST 2012 Mini Challenge 2 datasets, we use the InfoVis Toolkit (IVTK). Custom visualizations as well as extra interaction capabilities have been added to the toolkit.  ...  Interactive visual analytics tools allow security analysts to examine network activity and detect abnormal events with ease.  ... 
doi:10.1109/vast.2012.6400506 dblp:conf/ieeevast/ShurkhovetskyyBG12 fatcat:hcw2cya7n5esppivcllasp3b7m

Visual Analytics for Network Security and Critical Infrastructures [chapter]

Karolína Burská, Radek Ošlejšek
2017 Lecture Notes in Computer Science  
Our research is focused on designing new exploratory methods and interactive visualizations in the context of network security.  ...  The knowledge generation loop is important for its ability to help analysts to refine the nature of the processes that continuously occur and to offer them a better insight into the network security related  ...  This research was supported by the Security Research Programme of the Czech Republic 2015-2020 (BV III/1 VS) granted by the Ministry of the Interior of the Czech Republic under No.  ... 
doi:10.1007/978-3-319-60774-0_13 fatcat:hb4yivvmcrgwtdrn36h5wy54wu

Flexible web visualization for alert-based network security analytics

Lihua Hao, Christopher G. Healey, Steve E. Hutchinson
2013 Proceedings of the Tenth Workshop on Visualization for Cyber Security - VizSec '13  
This paper describes a web-based visualization system designed for network security analysts at the U.S. Army Research Laboratory (ARL).  ...  Our goal is to provide visual support to the analysts as they investigate security alerts for malicious activity within their systems.  ...  BACKGROUND Visualization has been proposed as an important component of network security analytics [2, 13, 20] .  ... 
doi:10.1145/2517957.2517962 dblp:conf/vizsec/HaoHH13 fatcat:dmf33uw3ifbqfi3wiepzxnteou

VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment [chapter]

Igor Kotenko, Evgenia Novikova
2013 Lecture Notes in Computer Science  
To illustrate the framework, we developed a SIEM visualization component VisSecAnalyzer. The paper demonstrates its possibilities for the tasks of attack modeling and security assessment.  ...  Visualization is the essential part of Security Information and Event Management (SIEM) systems.  ...  This research is being supported by grant of the Russian Foundation of Basic Research (project #13-01-00843-a), Program of fundamental research of the Department for Nanotechnologies and Informational  ... 
doi:10.1007/978-3-642-40588-4_24 fatcat:4beolijxzne23mebft3zoojg4u

Visual Analytics for Network Flow Analysis

John R. Goodall, Daniel R. Tesone
2009 2009 Cybersecurity Applications & Technology Conference for Homeland Security  
W e have integrated our visual analytics toolkit w ith netw ork flow data to provide a seamless workflow for computer network defense analysts.  ...  Cybersecurity Applications & Technology Conference For Homeland Security 978-0-7695-3568-5/09 $25.00  ...  This paper focuses on the integration of the visual analytics with a network flow analysis system, SiLK, the System for Internet-Level Knowledge.  ... 
doi:10.1109/catch.2009.47 fatcat:fe5umpmso5bgplpudhdly2nsk4

NetSecRadar: A real-time visualization system for network security: VAST 2012 Mini Challenge. Award: Honorable mention for interesting use of radial visualization technique

Ying Zhao, Fangfang Zhou, Ronghua Shi
2012 2012 IEEE Conference on Visual Analytics Science and Technology (VAST)  
3 :Figure 4 : 34 Overview of network security at one moment (left); Alerts filtered by workstation.  ...  INTRODUCTION VISUAL AND INTERACTION DESIGN Hosts and Alert types Attack Correlation and Interaction Figure 1 : 1 Initial design for our visualization system.  ... 
doi:10.1109/vast.2012.6400516 dblp:conf/ieeevast/ZhaoZS12 fatcat:3a6ux77vbvbaban43r63xgdhku

Visualizing Traffic Causality for Analyzing Network Anomalies

Hao Zhang, Maoyuan Sun, Danfeng (Daphne) Yao, Chris North
2015 Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics - IWSPA '15  
We design and develop a tool to visually represent the causal relations for network requests.  ...  Our tool with a special visual locality property supports different levels of visualbased querying and reasoning required for the sensemaking process on complex network data.  ...  As our tool is to visualize the network requests for security purposes, it is not built for the average users.  ... 
doi:10.1145/2713579.2713583 dblp:conf/codaspy/ZhangSYN15 fatcat:yobkjzt2xvgdloe723kvislpcy

Visual analysis for live LIDAR battlefield change detection

Thomas Butkiewicz, Remco Chang, Zachary Wartell, William Ribarsky, Moon S. Kim, Kaunglin Chao, William J. Tolone, William Ribarsky, Sergey I. Balandin, Bahram Javidi, Shu-I Tu
2008 Defense and Security 2008: Special Sessions on Food Safety, Visual Analytics, Resource Restricted Embedded and Sensor Networks, and 3D Imaging and Display  
We present the framework for a battlefield change detection system that allows military analysts to coordinate and utilize live collection of airborne LIDAR range data in a highly interactive visual interface  ...  Finally, the cycle is completed by the generation of a goal map for the LIDAR collection hardware that instructs as to which areas should be sampled next in order to best advance the change detection task  ...  Fig. 4 . 4 An example of an interactive visualization environment for analysis of detected change models.  ... 
doi:10.1117/12.777158 fatcat:zac42jxr6fa6vbm4fc6gxdisly

Visualizing uncertainty for geographical information in the global terrorism database

Josh Jones, Remco Chang, Thomas Butkiewicz, William Ribarsky, Moon S. Kim, Kaunglin Chao, William J. Tolone, William Ribarsky, Sergey I. Balandin, Bahram Javidi, Shu-I Tu
2008 Defense and Security 2008: Special Sessions on Food Safety, Visual Analytics, Resource Restricted Embedded and Sensor Networks, and 3D Imaging and Display  
Traditional uncertainty visualization techniques, such as those that change primitive attributes or employ animation, can create large amounts of clutter or actively distract when visualizing geospatially  ...  network depicted by geopolitical maps.  ...  Squarified treemaps form the basis for our technique because they allow for quick visual comparison between all, rather than only the dominant, members of a distribution.  ... 
doi:10.1117/12.777695 fatcat:pujip36eqnapdbbuso5w6bteqi

Modified pressure system for imaging egg cracks

Kurt C. Lawrence, Seung Chul Yoon, Deana R. Jones, Gerald W. Heitschmidt, Bosoon Park, William R. Windham, Moon S. Kim, Kaunglin Chao, William J. Tolone, William Ribarsky, Sergey I. Balandin, Bahram Javidi (+1 others)
2008 Defense and Security 2008: Special Sessions on Food Safety, Visual Analytics, Resource Restricted Embedded and Sensor Networks, and 3D Imaging and Display  
These times could easily be reduced with a compiled program specifically written for the application.  ...  In analyzing 1000 eggs, the system was 99.6% accurate overall with only 0.3% false positives, compared to 94.2% accurate overall for the human graders with 1.2% false positives.  ...  Alan Savage for help in constructing the chamber, and Ms. Patsy Mason for developing a method to micro-crack shell eggs.  ... 
doi:10.1117/12.786864 fatcat:s7iidgrcm5ejlapig3ddttpxke

Visual Analytics for cyber security and intelligence

Valérie Lavigne, Denis Gouin
2014 The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology  
The VA requirements are described for the cyber security and intelligence for counterterrorism application domains, along with promising research projects and commercial software.  ...  First, we introduce the important scientific visualization, interaction and reasoning concepts supporting VA. Then, we present some visual analytics advanced techniques.  ...  ACKNOWLEDGMENTS The authors wish to thank DRDC CSS (Centre for Security Sciences), in particular Mr Andrew Vallerand and Mr Jack Pagotto, for their indefectible interest in R&D work in Visual Analytics  ... 
doi:10.1177/1548512912464532 fatcat:qxmkcqgp7fdlxkh7b3zeptetum

Visual Analytics: Towards Intelligent Interactive Internet and Security Solutions [chapter]

James Davey, Florian Mansmann, Jörn Kohlhammer, Daniel Keim
2012 Lecture Notes in Computer Science  
Visual Analytics is an enabling technology, that offers new ways of extracting information from Big Data through intelligent, interactive internet and security solutions.  ...  Besides discussing the origins of Visual Analytics, this paper presents concrete examples of how the two facets, content and infrastructure, of the Future Internet can benefit from Visual Analytics.  ...  Visual Analytics for Network Infrastructure The growing complexity of network infrastructure cries out for more analytical support on both the automated side as well as on the human side.  ... 
doi:10.1007/978-3-642-30241-1_9 fatcat:jepv6mvrgbdxne7ub7odzuxzya

Towards Visual Cyber Security Analytics for the Masses [article]

Alex Ulmer, Marija Schufrin, Hendrik Lücke-Tieke, Clindo Devassy Kannanayikkal, Jörn Kohlhammer
2018 Eurographics Conference on Visualization  
With this paper, we want to share our vision of cyber security analytics becoming an accessible everyday task through visual analysis tools.  ...  We present an open, accessible and user-friendly visual network analyzer for PCAP (packet capture) files, critically discuss our first prototype, and give an outlook to anomaly detection supported by active  ...  An approach to visual cyber security analytics for general users with a description of the target group's requirements. 2.  ... 
doi:10.2312/eurova.20181113 dblp:conf/vissym/UlmerSLKK18 fatcat:mlw6tzfhfngzthubjgj53isdku

A Study Towards Post Hoc Forensic Analysis Using Big Data Analytics

Bipin Bihari Jayasingh
2018 CVR Journal of Science & Technology  
It is more focused on the techniques and associated tools for use of big data analytics for security and use of information security algorithms to protect big data.  ...  There is a well understood discussion about the security challenges of big data including big data privacy issues, data provenance problems and visual analytics.  ...  Big data visualization and analytic techniques are useful to analyze the huge network data available in the storage hub to address cyber security [2, 11] .  ... 
doi:10.32377/cvrjst1413 fatcat:tw6zhqpwozhb7pdha3dcezgigy

BANKSAFE: Visual analytics for big data in large-scale computer networks

Fabian Fischer, Johannes Fuchs, Florian Mansmann, Daniel A Keim
2013 Information Visualization  
BANKSAFE is based on modern database technologies and is capable of visually analyzing vast amounts of monitoring data and security-related datasets of large-scale computer networks.  ...  Additionally, we discuss lessons learned during the design and development of BANKSAFE, which are also applicable to other visual analytics applications for big data.  ...  architectures. 28 There is some effort, for example, in the VIS-SENSE project, to design a visual analytics framework for security-related datasets.  ... 
doi:10.1177/1473871613488572 fatcat:7wlsyhq3m5hlta2xmtpm6lpq2u
« Previous Showing results 1 — 15 out of 119,313 results