Putting security in context: Visual correlation of network activity with real-world information

WA Pike, C Scherrer, S Zabriskie - … 2007: Proceedings of the Workshop on …, 2008 - Springer
To effectively identify and respond to cyber threats, computer security analysts must
understand the scale, motivation, methods, source, and target of an attack. Central to …

Flexible web visualization for alert-based network security analytics

L Hao, CG Healey, SE Hutchinson - Proceedings of the Tenth Workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …

Real-time visualization of network behaviors for situational awareness

DM Best, S Bohn, D Love, A Wynne… - Proceedings of the seventh …, 2010 - dl.acm.org
Plentiful, complex, and dynamic data make understanding the state of an enterprise network
difficult. Although visualization can help analysts understand baseline behaviors in network …

[PDF][PDF] FloVis: Leveraging visualization to protect sensitive network infrastructure

J Glanfield, D Paterson, C Smith, T Taylor… - … Panel Symposium on …, 2010 - cs.dal.ca
Computer networks have become critical to NATO operations. Much of NATO's computer
traffic runs over civilian networks, and NATO computers are accessible to a wide variety of …

NVisionIP: netflow visualizations of system state for security situational awareness

K Lakkaraju, W Yurcik, AJ Lee - Proceedings of the 2004 ACM workshop …, 2004 - dl.acm.org
The number of attacks against large computer systems is currently growing at a rapid pace.
Despite the best efforts of security analysts, large organizations are having trouble keeping …

[PDF][PDF] Correlation between netflow system and network views for intrusion detection

C Abad, Y Li, K Lakkaraju, X Yin… - Workshop on Link …, 2004 - academia.edu
We present several ways to correlate security events from two applications that visualize the
same underlying data with two distinct views: system and network. Correlation of security …

Visualization design for immediate high-level situational assessment

RF Erbacher - Proceedings of the ninth international symposium on …, 2012 - dl.acm.org
We present the design of a visualization technique based on the results of a human in the
loop process, which relied on network managers and network analysts. This visualization …

Visualization techniques for computer network defense

JM Beaver, CA Steed, RM Patton… - … , and Intelligence (C3I …, 2011 - spiedigitallibrary.org
Effective visual analysis of computer network defense (CND) information is challenging due
to the volume and complexity of both the raw and analyzed network data. A typical CND is …

[PDF][PDF] Cyber security through visualization

KL Ma - ACM International Conference Proceeding Series, 2006 - Citeseer
Networked computers are subject to attack, misuse, and abuse. Organizations and
individuals are making every effort to build and maintain trustworthy computing systems. The …

Over flow: An overview visualization for network analysis

J Glanfield, S Brooks, T Taylor… - … on Visualization for …, 2009 - ieeexplore.ieee.org
Many network visualizations make the assumption that an administrator has previously
determined the subset of data that should be visualized. Yet the problem remains that if the …