[图书][B] Security data visualization: graphical techniques for network analysis

G Conti - 2007 - books.google.com
Information overload. If you're responsible for maintaining your network's security, you're
living with it every day. Logs, alerts, packet captures, and even binary files take time and …

[图书][B] Applied security visualization

R Marty - 2008 - dl.acm.org
APPLIED SECURITY VISUALIZATION Collecting log data is one thing, having relevant
information is something else. The art to transform all kinds of log data into meaningful …

A survey, taxonomy, and analysis of network security visualization techniques

RR Kasemsri - 2006 - scholarworks.gsu.edu
Network security visualization is a relatively new field and is quickly gaining momentum.
Network security visualization allows the display and projection of the network or system …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

Flexible web visualization for alert-based network security analytics

L Hao, CG Healey, SE Hutchinson - Proceedings of the Tenth Workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

A survey on network security data visualization

Y Zhao, X Fan, F Zhou, F Wang, J Zhang - Journal of Computer-Aided …, 2014 - jcad.cn
As a young community of network security research, visualization for network security
focuses on taking advantage of the power of the human perceptual and cognitive processes …

Countering security information overload through alert and packet visualization

G Conti, K Abdullah, J Grizzard, J Stasko… - IEEE Computer …, 2006 - ieeexplore.ieee.org
This article presents a framework for designing network security visualization systems as
well as results from the end-to-end design and implementation of two highly interactive …

Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats

F Mansmann, DA Keim, SC North… - … on Visualization and …, 2007 - ieeexplore.ieee.org
The Internet has become a wild place: malicious code is spread on personal computers
across the world, deploying botnets ready to attack the network infrastructure. The vast …

Real-time visualization of network behaviors for situational awareness

DM Best, S Bohn, D Love, A Wynne… - Proceedings of the seventh …, 2010 - dl.acm.org
Plentiful, complex, and dynamic data make understanding the state of an enterprise network
difficult. Although visualization can help analysts understand baseline behaviors in network …