Abstract
Cyber security visualization is becoming a hot research field. Visualization and interactive analysis can greatly help network managers and analysts monitor network, detect anomalies, and assess the situation of network. A large number of papers have been published in this field, and a lot of novel visual tools have been proposed. In this paper, we provide a comprehensive review of visualization systems for cyber security. Firstly, we introduce the advantage and importance of cyber security visualization. Then, we summarize the categorization of cyber security visualization systems. At last, we draw conclusion by evaluating these systems and prospect for future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Harrison, L, and A. Lu. “The future of security visualization: Lessons from network visualization.” Network IEEE 26.6(2012):6–11.
Liang-Fu, L., et al. “Survey of network security visualization techniques.” Journal of Computer Applications 28.28(2008):1924–1927.
Shiravi, A., H. Shiravi, and A. A. Ghorbani. “A Survey of Visualization Systems for Network Security.” IEEE Transactions on Visualization & Computer Graphics 18.8(2012):1313–1329.
Ying, Zhao, et al. “A Survey on Network Security Data Visualization.” Journal of Computer-Aided Design and Computer Graphics 26.5(2014):687–697.
Koike, H, K. Ohno, and K. Koizumi. “Visualizing cyber attacks using IP matrix.” Visualization for Computer Security IEEE, 2005:91–98.
Mansmann, Florian, et al. “Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats.” IEEE Transactions on Visualization & Computer Graphics 13.6(2007):1105.
Endsley, Mica R. “Toward a theory of situation awareness in dynamic systems.” Human Factors the Journal of the Human Factors & Ergonomics Society 37.1(1995):32–64.
Livnat, Yarden, et al. “Visual Correlation for Situational Awareness.” Information Visualization, 2005. INFOVIS 2005. IEEE Symposium on IEEE, 2005:95–102.
Vadrevu, Phani, et al. “Measuring and Detecting Malware Downloads in Live Network Traffic.” (2013).
Angelini, Marco, et al. “The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics.” Visualization for Cyber Security IEEE, 2017:1–8.
Arendt, Dustin, et al. “CyberPetri at CDX 2016: Real-time network situation awareness.” Visualization for Cyber Security IEEE, 2016:1–4.
Arendt, D. L, et al. “Ocelot: user-centered design of a decision support visualization for network quarantine.” Visualization for Cyber Security IEEE, 2015:1–8.
Angelini, Marco, N. Prigent, and G. Santucci. “PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics.” Visualization for Cyber Security IEEE, 2015:1–8.
Fischer, Fabian, and D. A. Keim. “NStreamAware: real-time visual analytics for data streams to enhance situational awareness.” (2014):65–72.
Best, et al. “Real-time visualization of network behaviors for situational awareness.” Proceedings of the Seventh International Symposium on Visualization for Cyber Security Vizsec’ (2010):79–90.
Cappers, Bram C. M., and J. J. V. Wijk. “SNAPS: Semantic network traffic analysis through projection and selection.” Visualization for Cyber Security IEEE, 2015:1–8.
Chen, Siming, et al. “OCEANS: online collaborative explorative analysis on network security.” 434(2014):1–8.
Theron, Roberto, et al. “Network-wide intrusion detection supported by multivariate analysis and interactive visualization.” Visualization for Cyber Security IEEE, 2017:1–8.
Syamkumar, Meenakshi, R. Durairajan, and P. Barford. “Bigfoot: A geo-based visualization methodology for detecting BGP threats.” Visualization for Cyber Security IEEE, 2016:1–8.
Legg, Philip A. “Visualizing the insider threat: challenges and tools for identifying malicious user activity.” Visualization for Cyber Security IEEE, 2015:1–7.
Siadati, Hossein, B. Saket, and N. Memon. “Detecting malicious logins in enterprise networks using visualization.” Visualization for Cyber Security IEEE, 2016:1–8.
Stange, Jan Erik, et al. “Visual filter: graphical exploration of network security log files.” (2014):41–48.
Bidan, Christophe, C. Bidan, and C. Bidan. “ELVIS: Extensible Log VISualization.” Tenth Workshop on Visualization for Cyber Security ACM, 2013:9–16.
Alsaleh, Mansour, et al. “Visualizing PHPIDS log files for better understanding of web server attacks.” Tenth Workshop on Visualization for Cyber Security 2013:1–8.
Fink, Glenn A., et al. “Visualizing cyber security: Usable workspaces.” International Workshop on Visualization for Cyber Security IEEE, 2010:45–56.
Sethi, Aneesha, and G. Wills. “Expert-interviews led analysis of EEVi — A model for effective visualization in cyber-security.” Visualization for Cyber Security IEEE, 2017:1–8.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhao, H., Tang, W., Zou, X., Wang, Y., Zu, Y. (2019). Analysis of Visualization Systems for Cyber Security. In: Patnaik, S., Jain, V. (eds) Recent Developments in Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 752. Springer, Singapore. https://doi.org/10.1007/978-981-10-8944-2_122
Download citation
DOI: https://doi.org/10.1007/978-981-10-8944-2_122
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8943-5
Online ISBN: 978-981-10-8944-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)