Oceans: Online collaborative explorative analysis on network security

S Chen, C Guo, X Yuan, F Merkle, H Schaefer… - Proceedings of the …, 2014 - dl.acm.org
Visualization and interactive analysis can help network administrators and security analysts
analyze the network flow and log data. The complexity of such an analysis requires a …

VAFLE: Visual analytics of firewall log events

M Ghoniem, G Shurkhovetskyy… - … and Data Analysis …, 2014 - spiedigitallibrary.org
In this work, we present VAFLE, an interactive network security visualization prototype for the
analysis of firewall log events. Keeping it simple yet effective for analysts, we provide …

Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers

CP Lee, JA Copeland - Proceedings of the 3rd international workshop …, 2006 - dl.acm.org
Current tools for forensic analysis require many hours to understand novel attacks, causing
reports to be terse and untimely. We apply visual filtering and tagging of flows in a novel way …

Insight2: A modular visual analysis platform for network situational awareness in large-scale networks

HADE Kodituwakku, A Keller, J Gregor - Electronics, 2020 - mdpi.com
The complexity and throughput of computer networks are rapidly increasing as a result of the
proliferation of interconnected devices, data-driven applications, and remote working …

Flexible web visualization for alert-based network security analytics

L Hao, CG Healey, SE Hutchinson - Proceedings of the Tenth Workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …

Real-time visualization of network behaviors for situational awareness

DM Best, S Bohn, D Love, A Wynne… - Proceedings of the seventh …, 2010 - dl.acm.org
Plentiful, complex, and dynamic data make understanding the state of an enterprise network
difficult. Although visualization can help analysts understand baseline behaviors in network …

[PDF][PDF] Internet security visualization case study: Instrumenting a network for NetFlow security visualization tools

W Yurcik, Y Li - 21st Annual Computer Security Applications …, 2005 - researchgate.net
With the development of the Internet and organizational intranets, it has become an
increasingly critical and difficult task to monitor large and complex networks-indispensable …

Interactive exploration of data traffic with hierarchical network maps

F Mansmann, S Vinnik - IEEE transactions on visualization and …, 2006 - ieeexplore.ieee.org
Network communication has become indispensable in business, education, and
government. With the pervasive role of the Internet as a means of sharing information across …

Situ: Identifying and explaining suspicious behavior in networks

JR Goodall, ED Ragan, CA Steed… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Despite the best efforts of cyber security analysts, networked computing assets are routinely
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …

Focusing on context in network traffic analysis

JR Goodall, WG Lutters, P Rheingans… - IEEE Computer …, 2006 - ieeexplore.ieee.org
The time-based network traffic visualizer combines low-level, textual detail with multiple
visualizations of the larger context to help users construct a security event's big picture. TNV …