Data Visualization for cybersecurity

L Harrison - Big Data Analytics in Cybersecurity, 2017 - taylorfrancis.com
Data visualization is an indispensable means for analysis and communication, particularly in
cyber security. Promising techniques and systems for cyber data visualization have emerged …

Towards metric-driven, application-specific visualization of attack graphs

M Emirkanian-Bouchard, L Wang - … , FPS 2016, Québec City, QC, Canada …, 2017 - Springer
As a model of vulnerability information, attack graph has seen successes in many automated
analyses for defending computer networks against potential intrusions. On the other hand …

[图书][B] Applied security visualization

R Marty - 2008 - dl.acm.org
APPLIED SECURITY VISUALIZATION Collecting log data is one thing, having relevant
information is something else. The art to transform all kinds of log data into meaningful …

[图书][B] Security data visualization: graphical techniques for network analysis

G Conti - 2007 - books.google.com
Information overload. If you're responsible for maintaining your network's security, you're
living with it every day. Logs, alerts, packet captures, and even binary files take time and …

[PDF][PDF] Information fusion and visualization of cyber-attack graphs

G Chen, H Chen, E Blasch, M Kruger, J Cruz - SPIE Newsroom, 2007 - academia.edu
Many security sensors and other protection mechanisms are deployed at different levels to
provide what is known as defensein-depth for systems and networks. However, the large …

Techniques for attack graph visualization and interaction

Z Harbort, G Louthan, J Hale - … of the Seventh Annual Workshop on …, 2011 - dl.acm.org
Attack graphs provide a comprehensive overview of attack vectors. Unfortunately, their
complexity dramatically increases as the number of hosts in a network grows. For realistic …

[PDF][PDF] FloVis: Leveraging visualization to protect sensitive network infrastructure

J Glanfield, D Paterson, C Smith, T Taylor… - … Panel Symposium on …, 2010 - cs.dal.ca
Computer networks have become critical to NATO operations. Much of NATO's computer
traffic runs over civilian networks, and NATO computers are accessible to a wide variety of …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

A graph-theoretic visualization approach to network risk analysis

S O'Hare, S Noel, K Prole - International Workshop on Visualization for …, 2008 - Springer
This paper describes a software system that provides significant new capabilities for
visualization and analysis of network attack graphs produced through Topological …

Improving attack graph visualization through data reduction and attack grouping

J Homer, A Varikuti, X Ou, MA McQueen - Visualization for Computer …, 2008 - Springer
Various tools exist to analyze enterprise network systems and to produce attack graphs
detailing how attackers might penetrate into the system. These attack graphs, however, are …