A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Follow the clicks: Learning and anticipating mouse interactions during exploratory data analysis

A Ottley, R Garnett, R Wan - Computer Graphics Forum, 2019 - Wiley Online Library
The goal of visual analytics is to create a symbiosis between human and computer by
leveraging their unique strengths. While this model has demonstrated immense success, we …

Visualizing cyber security: Usable workspaces

GA Fink, CL North, A Endert… - 2009 6th international …, 2009 - ieeexplore.ieee.org
The goal of cyber security visualization is to help analysts increase the safety and
soundness of our digital infrastructures by providing effective tools and workspaces …

Solution for information overload using faceted search–a review

MN Mahdi, AR Ahmad, R Ismail, H Natiq… - IEEE …, 2020 - ieeexplore.ieee.org
In the modern society, Internet provides massive amounts of heterogeneous information,
hence Information overload has become an ubiquitous issue. In this paper, we conduct a …

Monitoring large ip spaces with clockview

C Kintzel, J Fuchs, F Mansmann - … of the 8th international symposium on …, 2011 - dl.acm.org
The growing amounts of hosts that are placed into the networks represent an enormous
challenge to most network administrators who have to monitor these hosts conscientiously …

DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system

D Inoue, M Eto, K Suzuki, M Suzuki… - Proceedings of the ninth …, 2012 - dl.acm.org
A darknet is a set of unused IP addresses whose monitoring is an effective way of detecting
malicious activities on the Internet. We have developed an alert system called DAEDALUS …

Visualizing traffic causality for analyzing network anomalies

H Zhang, M Sun, D Yao, C North - Proceedings of the 2015 ACM …, 2015 - dl.acm.org
Monitoring network traffic and detecting anomalies are essential tasks that are carried out
routinely by security analysts. The sheer volume of network requests often makes it difficult …

Introduction to visualization for computer security

JR Goodall - VizSEC 2007: Proceedings of the Workshop on …, 2008 - Springer
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse.
Automated systems to combat this threat are one potential solution, but most automated …

Selltrend: Inter-attribute visual analysis of temporal transaction data

Z Liu, J Stasko, T Sullivan - IEEE Transactions on Visualization …, 2009 - ieeexplore.ieee.org
We present a case study of our experience designing SellTrend, a visualization system for
analyzing airline travel purchase requests. The relevant transaction data can be …