Abstract
Detecting malicious attempts to access computers is difficult with current security applications. Many current applications do not give the user the right information to find and analyze possible attempts. We present VisRAID – a novel visual analytics web application for detecting intrusions via remote access attempts, and a user study to evaluate the effectiveness and usability of the application with security professionals. The implications of the study will help inform the design of future security visualization applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bertini, E., Hertzog, P., Lalanne, D.: SpiralView: towards security policies assessment through visual correlation of network resources with evolution of alarms. In: Proc. of Conference on Visual Analytics Science and Technology (VAST), pp. 139–146. IEEE (2007)
Bostock, M., Ogievetsky, V., Heer, J.: D\(^3\) Data-Driven Documents. IEEE Transactions on Visualization and Computer Graphics 17(12), 2301–2309 (2011)
Chin, G., Singhal, M., Nakamura, G., Gurumoorthi, V., Freeman-Cadoret, N.: Visual analysis of dynamic data streams. Information Visualization 8(3), 212–229 (2009)
Data Geekery. jOOQ: Get back in control of your SQL, October 30, 2013. http://jooq.org
Fan, J., Xu, J., Ammar, M., Moon, S.: Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. Computer Networks 46(2), 253–272 (2004)
Honeynet Project. Forensic Challenge 10 - Attack Visualization, June 05, 2013. http://www.honeynet.org/challenges/attack_visualization_challenge
Itoh, T., Takakura, H., Sawada, A., Koyamada, K.: Hierarchical visualization of network intrusion detection data. IEEE Computer Graphics Applications 26(2), 40–47 (2006)
Lewis, J.R.: IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction 7(1), 57–78 (1995)
Makanju, A., Brooks, S., Zincir-Heywood, A., Milios, E.: LogView: visualizing event log clusters. In: Proc. of Conference on Privacy, Security and Trust (PST), pp. 99–108. IEEE (2008)
Mukosaka, S., Koike, H.: Integrated visualization system for monitoring security in large-scale local area network. In: Proc. of the Asia-Pacific Symposium on Information Visualisation (APVIS), pp. 41–44. IEEE (2007)
Stanton, N.: Human factors in alarm design. CRC Press (1994)
Tricaud, S.: PicViz: finding a needle in a haystack. In: Proc. of the USENIX Conference on Analysis of System Logs. USENIX Association (2008)
Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proc. of the Symposium on Operating Systems Principles (SIGOPS), pp. 117–132. ACM (2009)
Zhang, Y., Xiao, Y., Chen, M., Zhang, J., Deng, H.: A survey of security visualization for computer network logs. Security and Communication Networks 5(4), 404–421 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Trethowen, L., Anslow, C., Marshall, S., Welch, I. (2015). VisRAID: Visualizing Remote Access for Intrusion Detection. In: Foo, E., Stebila, D. (eds) Information Security and Privacy. ACISP 2015. Lecture Notes in Computer Science(), vol 9144. Springer, Cham. https://doi.org/10.1007/978-3-319-19962-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-19962-7_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19961-0
Online ISBN: 978-3-319-19962-7
eBook Packages: Computer ScienceComputer Science (R0)