P3D: A parallel 3D coordinate visualization for advanced network scans

T Nunnally, P Chi, K Abdullah… - 2013 IEEE …, 2013 - ieeexplore.ieee.org
As network attacks increase in complexity, network administrators will continue to struggle
with analyzing security data immediately and efficiently. To alleviate these challenges …

Interactively combining 2D and 3D visualization for network traffic monitoring

E Le Malecot, M Kohara, Y Hori, K Sakurai - Proceedings of the 3rd …, 2006 - dl.acm.org
With the multiplication of attacks against computer networks, system administrators need to
monitor carefully the networks they manage. However, that monitoring task is made harder …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

Fast detection and visualization of network attacks on parallel coordinates

H Choi, H Lee, H Kim - computers & security, 2009 - Elsevier
This article presents what we call the parallel coordinate attack visualization (PCAV) for
detecting unknown large-scale Internet attacks including Internet worms, DDoS attacks and …

Oceans: Online collaborative explorative analysis on network security

S Chen, C Guo, X Yuan, F Merkle, H Schaefer… - Proceedings of the …, 2014 - dl.acm.org
Visualization and interactive analysis can help network administrators and security analysts
analyze the network flow and log data. The complexity of such an analysis requires a …

Evaluating visualization approaches to detect abnormal activities in network traffic data

SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

Real-time and forensic network data analysis using animated and coordinated visualization

S Krasser, G Conti, J Grizzard… - … from the Sixth …, 2005 - ieeexplore.ieee.org
Rapidly detecting and classifying malicious activity contained within network traffic is a
challenging problem exacerbated by large datasets and functionally limited manual analysis …

TVi: A visual querying system for network monitoring and anomaly detection

A Boschetti, L Salgarelli, C Muelder… - Proceedings of the 8th …, 2011 - dl.acm.org
Monitoring, anomaly detection and forensics are essential tasks that must be carried out
routinely for every computer network. The sheer volume of data generated by conventional …

Situ: Identifying and explaining suspicious behavior in networks

JR Goodall, ED Ragan, CA Steed… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Despite the best efforts of cyber security analysts, networked computing assets are routinely
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …