A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Gragnostics rendering

RP Gove - US Patent 10,657,686, 2020 - Google Patents
A graph processing system, method and apparatus classifies graphs based on a linearly
computable set of features defined as a feature vector adapted for comparison with the …

Visual analytics of anomalous user behaviors: A survey

Y Shi, Y Liu, H Tong, J He, G Yan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the pervasive use of information technologies, the increasing availability of data
provides new opportunities for understanding user behaviors. Unearthing anomalies in user …

Extended user session tracking

M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2019 - Google Patents
Network activity data is received, for example, from a set of agents reporting collectively
information about a set of hosts. The received network activity data is used to identify a user …

Using graph-based models to identify datacenter anomalies

V Kapoor, SJ Pullara III, M Bog, Y Chen… - US Patent …, 2020 - Google Patents
Activities within a network environment are monitored (eg, using agents). At least a portion of
the monitored activities are used to generate a logical graph model. The generated logical …

Assessing a decision support tool for SOC analysts

J Happa, I Agrafiotis, M Helmhout… - … Threats: Research and …, 2021 - dl.acm.org
It is difficult to discern real-world consequences of attacks on an enterprise when
investigating network-centric data alone. In recent years, many tools have been developed …

Visual analytics for cyber security domain: State-of-the-art and challenges

R Damaševičius, J Toldinas, A Venčkauskas… - … Conference, ICIST 2019 …, 2019 - Springer
Visual Analytics is a complex sub-field of data analytics that concentrates on the use of the
information visualization methods for facilitating effective analysis of data by employing …

NetCube: a comprehensive network traffic analysis model based on multidimensional OLAP data cube

D Park, J Yu, JS Park, MS Kim - International Journal of …, 2013 - Wiley Online Library
Network traffic monitoring and analysis are essential for effective network operation and
resource management. In particular, multidimensional analysis for long‐term traffic data is …

Cybervis: visualizing the potential impact of cyber attacks on the wider enterprise

S Creese, M Goldsmith, N Moffat… - … on Technologies for …, 2013 - ieeexplore.ieee.org
A variety of data-mining tools and filtering techniques exist to detect and analyze cyber-
attacks by monitoring network traffic. In recent years many of these tools use visualization …