In this work, we present VAFLE, an interactive network security visualization prototype for the analysis of firewall log events. Keeping it simple yet effective for analysts, we provide …
CP Lee, JA Copeland - Proceedings of the 3rd international workshop …, 2006 - dl.acm.org
Current tools for forensic analysis require many hours to understand novel attacks, causing reports to be terse and untimely. We apply visual filtering and tagging of flows in a novel way …
HADE Kodituwakku, A Keller, J Gregor - Electronics, 2020 - mdpi.com
The complexity and throughput of computer networks are rapidly increasing as a result of the proliferation of interconnected devices, data-driven applications, and remote working …
L Hao, CG Healey, SE Hutchinson - Proceedings of the Tenth Workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …
DM Best, S Bohn, D Love, A Wynne… - Proceedings of the seventh …, 2010 - dl.acm.org
Plentiful, complex, and dynamic data make understanding the state of an enterprise network difficult. Although visualization can help analysts understand baseline behaviors in network …
W Yurcik, Y Li - 21st Annual Computer Security Applications …, 2005 - researchgate.net
With the development of the Internet and organizational intranets, it has become an increasingly critical and difficult task to monitor large and complex networks-indispensable …
F Mansmann, S Vinnik - IEEE transactions on visualization and …, 2006 - ieeexplore.ieee.org
Network communication has become indispensable in business, education, and government. With the pervasive role of the Internet as a means of sharing information across …
Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets …
The time-based network traffic visualizer combines low-level, textual detail with multiple visualizations of the larger context to help users construct a security event's big picture. TNV …