[PDF][PDF] FloVis: Leveraging visualization to protect sensitive network infrastructure

J Glanfield, D Paterson, C Smith, T Taylor… - … Panel Symposium on …, 2010 - cs.dal.ca
Computer networks have become critical to NATO operations. Much of NATO's computer
traffic runs over civilian networks, and NATO computers are accessible to a wide variety of …

[PDF][PDF] Processing data to construct practical visualizations for network security

K Abdullah, C Lee, G Conti, J Copeland - Information Assurance …, 2006 - rumint.org
Network vulnerabilities are increasingly rampant despite advances in Intrusion Detection
Systems (IDSs) and Intrusion Prevention Systems (IPSs). Even as funding and work by …

[图书][B] Security data visualization: graphical techniques for network analysis

G Conti - 2007 - books.google.com
Information overload. If you're responsible for maintaining your network's security, you're
living with it every day. Logs, alerts, packet captures, and even binary files take time and …

Flexible web visualization for alert-based network security analytics

L Hao, CG Healey, SE Hutchinson - Proceedings of the Tenth Workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …

Putting security in context: Visual correlation of network activity with real-world information

WA Pike, C Scherrer, S Zabriskie - … 2007: Proceedings of the Workshop on …, 2008 - Springer
To effectively identify and respond to cyber threats, computer security analysts must
understand the scale, motivation, methods, source, and target of an attack. Central to …

[PDF][PDF] Simplified Network Traffic Visualization for Real-Time Security Analysis

M Dean, L Vespa - Proceedings of the International Conference on …, 2013 - world-comp.org
Although traditional methods of network security analysis used in investigating network
traffic and log files are essential to mitigating malicious network activity, these methods …

Real-time and forensic network data analysis using animated and coordinated visualization

S Krasser, G Conti, J Grizzard… - … from the Sixth …, 2005 - ieeexplore.ieee.org
Rapidly detecting and classifying malicious activity contained within network traffic is a
challenging problem exacerbated by large datasets and functionally limited manual analysis …

[图书][B] Applied security visualization

R Marty - 2008 - dl.acm.org
APPLIED SECURITY VISUALIZATION Collecting log data is one thing, having relevant
information is something else. The art to transform all kinds of log data into meaningful …

Data Visualization for cybersecurity

L Harrison - Big Data Analytics in Cybersecurity, 2017 - taylorfrancis.com
Data visualization is an indispensable means for analysis and communication, particularly in
cyber security. Promising techniques and systems for cyber data visualization have emerged …

Real-time visualization of network behaviors for situational awareness

DM Best, S Bohn, D Love, A Wynne… - Proceedings of the seventh …, 2010 - dl.acm.org
Plentiful, complex, and dynamic data make understanding the state of an enterprise network
difficult. Although visualization can help analysts understand baseline behaviors in network …