A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Visual reverse engineering of binary and data files

G Conti, E Dean, M Sinda, B Sangster - International Workshop on …, 2008 - Springer
The analysis of computer files poses a difficult problem for security researchers seeking to
detect and analyze malicious content, software developers stress testing file formats for their …

Visual discovery in computer network defense

AD D'Amico, JR Goodall, DR Tesone… - IEEE Computer …, 2007 - ieeexplore.ieee.org
Computer network defense (CND) requires analysts to detect both known and novel forms of
attacks in massive volumes of network data. It's through discovering the unexpected that …

Eventpad: Rapid malware analysis and reverse engineering using visual analytics

BCM Cappers, PN Meessen, S Etalle… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
Forensic analysis of malware activity in network environments is a necessary yet very costly
and time consuming part of incident response. Vast amounts of data need to be screened, in …

Attacking information visualization system usability overloading and deceiving the human

G Conti, M Ahamad, J Stasko - Proceedings of the 2005 symposium on …, 2005 - dl.acm.org
Information visualization is an effective way to easily comprehend large amounts of data. For
such systems to be truly effective, the information visualization designer must be aware of …

Ensemble visualization for cyber situation awareness of network security data

L Hao, CG Healey… - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Network security analysis and ensemble data visualization are two active research areas.
Although they are treated as separate domains, they share many common challenges and …

SpiralView: towards security policies assessment through visual correlation of network resources with evolution of alarms

E Bertini, P Hertzog, D Lalanne - 2007 IEEE symposium on …, 2007 - ieeexplore.ieee.org
This article presents SpiralView, a visualization tool for helping system administrators to
assess network policies. The tool is meant to be a complementary support to the routine …

Introduction to visualization for computer security

JR Goodall - VizSEC 2007: Proceedings of the Workshop on …, 2008 - Springer
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse.
Automated systems to combat this threat are one potential solution, but most automated …

SNAPS: Semantic network traffic analysis through projection and selection

BCM Cappers, JJ van Wijk - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Most network traffic analysis applications are designed to discover malicious activity by only
relying on high-level flow-based message properties. However, to detect security breaches …

Countering security information overload through alert and packet visualization

G Conti, K Abdullah, J Grizzard, J Stasko… - IEEE Computer …, 2006 - ieeexplore.ieee.org
This article presents a framework for designing network security visualization systems as
well as results from the end-to-end design and implementation of two highly interactive …