Analysis of Network Attacks and Security Events using Modern Data Visualization Techniques

PM Pereira - 2015 - ubibliorum.ubi.pt
… The proposed technique is based on static and dynamic dependency analysis between
software … The development, implementation and validation of the technique presented in this …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - … on visualization and …, 2011 - ieeexplore.ieee.org
… ALTHOUGH the visualization of network security events is … network security: As the title of
the paper indicates, this study … include network security, security data visualization, network

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
… Common data visualization techniques, which turn the data to a … of security events generated
in modern networks has … work on network attack taxonomies and analyze their properties …

Analysis of techniques for visualizing security risks and threats

CP Udeagwu, S Sotiriadis… - … , Cloud and Internet …, 2015 - ieeexplore.ieee.org
… We perform a an analysis of data visualization for identifying … and attacks, in Section 3 we
cover the visualization process task … library in order to visualize activities or threats, in Section 4 …

Design and implementation of real-time visualization tool for network security monitoring

A Safdar, H Durad, M Alam - … on Applied Sciences and …, 2018 - ieeexplore.ieee.org
data management, data visualization, human perception and … using captured data of one
of the most notorious attack of … phase, Analysis, CEP has been configured to receive events in …

[PDF][PDF] Security Analysis and Data Visualization

O Akindeinde - Lagos, Nigeria, 2009 - blog.nicolamoretti.com
security events in an analytical and visual representation will … and techniques of security
analysis and visualization without … will use the illustration below where an ARP poisoning attack

Wireless sensor network security visualization

E Karapistoli, AA Economides - … Congress on Ultra Modern …, 2012 - ieeexplore.ieee.org
application of visual analysis for wireless sensor network … standard data visualization tools
add a new aspect of networktechniques in visualizing security-related data and events. The …

Flexible web visualization for alert-based network security analytics

L Hao, CG Healey, SE Hutchinson - … on Visualization for Cyber Security, 2013 - dl.acm.org
… potential network security incidents. Discussions with a wide range of … to support visual
analysis of network security data. Node– link … NetFlow data visualization based on graphs. In …

Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems

JJ Walker, T Jones, R Blount - … for Homeland Security (HST), 2011 - ieeexplore.ieee.org
techniques, to forecast cyber security attacks by identifying emerging threats based on analysis
of … Recent events on the international stage demonstrate the damage the typical intrusion …

[HTML][HTML] Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization

E Muhati, D Rawat - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
… straightforward technique for extracting network data using … by not just visualizing security
events for informed cyber … crucial to our analysis based on the attack dataset. Accuracy is our …