[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Analysis of Visualization Systems for Cyber Security

  • Conference paper
  • First Online:
Recent Developments in Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 752))

Abstract

Cyber security visualization is becoming a hot research field. Visualization and interactive analysis can greatly help network managers and analysts monitor network, detect anomalies, and assess the situation of network. A large number of papers have been published in this field, and a lot of novel visual tools have been proposed. In this paper, we provide a comprehensive review of visualization systems for cyber security. Firstly, we introduce the advantage and importance of cyber security visualization. Then, we summarize the categorization of cyber security visualization systems. At last, we draw conclusion by evaluating these systems and prospect for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Harrison, L, and A. Lu. “The future of security visualization: Lessons from network visualization.” Network IEEE 26.6(2012):6–11.

    Google Scholar 

  2. Liang-Fu, L., et al. “Survey of network security visualization techniques.” Journal of Computer Applications 28.28(2008):1924–1927.

    Google Scholar 

  3. Shiravi, A., H. Shiravi, and A. A. Ghorbani. “A Survey of Visualization Systems for Network Security.” IEEE Transactions on Visualization & Computer Graphics 18.8(2012):1313–1329.

    Google Scholar 

  4. Ying, Zhao, et al. “A Survey on Network Security Data Visualization.” Journal of Computer-Aided Design and Computer Graphics 26.5(2014):687–697.

    Google Scholar 

  5. Koike, H, K. Ohno, and K. Koizumi. “Visualizing cyber attacks using IP matrix.” Visualization for Computer Security IEEE, 2005:91–98.

    Google Scholar 

  6. Mansmann, Florian, et al. “Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats.” IEEE Transactions on Visualization & Computer Graphics 13.6(2007):1105.

    Google Scholar 

  7. Endsley, Mica R. “Toward a theory of situation awareness in dynamic systems.” Human Factors the Journal of the Human Factors & Ergonomics Society 37.1(1995):32–64.

    Google Scholar 

  8. Livnat, Yarden, et al. “Visual Correlation for Situational Awareness.” Information Visualization, 2005. INFOVIS 2005. IEEE Symposium on IEEE, 2005:95–102.

    Google Scholar 

  9. Vadrevu, Phani, et al. “Measuring and Detecting Malware Downloads in Live Network Traffic.” (2013).

    Google Scholar 

  10. Angelini, Marco, et al. “The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics.” Visualization for Cyber Security IEEE, 2017:1–8.

    Google Scholar 

  11. Arendt, Dustin, et al. “CyberPetri at CDX 2016: Real-time network situation awareness.” Visualization for Cyber Security IEEE, 2016:1–4.

    Google Scholar 

  12. Arendt, D. L, et al. “Ocelot: user-centered design of a decision support visualization for network quarantine.” Visualization for Cyber Security IEEE, 2015:1–8.

    Google Scholar 

  13. Angelini, Marco, N. Prigent, and G. Santucci. “PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics.” Visualization for Cyber Security IEEE, 2015:1–8.

    Google Scholar 

  14. Fischer, Fabian, and D. A. Keim. “NStreamAware: real-time visual analytics for data streams to enhance situational awareness.” (2014):65–72.

    Google Scholar 

  15. Best, et al. “Real-time visualization of network behaviors for situational awareness.” Proceedings of the Seventh International Symposium on Visualization for Cyber Security Vizsec’ (2010):79–90.

    Google Scholar 

  16. Cappers, Bram C. M., and J. J. V. Wijk. “SNAPS: Semantic network traffic analysis through projection and selection.” Visualization for Cyber Security IEEE, 2015:1–8.

    Google Scholar 

  17. Chen, Siming, et al. “OCEANS: online collaborative explorative analysis on network security.” 434(2014):1–8.

    Google Scholar 

  18. Theron, Roberto, et al. “Network-wide intrusion detection supported by multivariate analysis and interactive visualization.” Visualization for Cyber Security IEEE, 2017:1–8.

    Google Scholar 

  19. Syamkumar, Meenakshi, R. Durairajan, and P. Barford. “Bigfoot: A geo-based visualization methodology for detecting BGP threats.” Visualization for Cyber Security IEEE, 2016:1–8.

    Google Scholar 

  20. Legg, Philip A. “Visualizing the insider threat: challenges and tools for identifying malicious user activity.” Visualization for Cyber Security IEEE, 2015:1–7.

    Google Scholar 

  21. Siadati, Hossein, B. Saket, and N. Memon. “Detecting malicious logins in enterprise networks using visualization.” Visualization for Cyber Security IEEE, 2016:1–8.

    Google Scholar 

  22. Stange, Jan Erik, et al. “Visual filter: graphical exploration of network security log files.” (2014):41–48.

    Google Scholar 

  23. Bidan, Christophe, C. Bidan, and C. Bidan. “ELVIS: Extensible Log VISualization.” Tenth Workshop on Visualization for Cyber Security ACM, 2013:9–16.

    Google Scholar 

  24. Alsaleh, Mansour, et al. “Visualizing PHPIDS log files for better understanding of web server attacks.” Tenth Workshop on Visualization for Cyber Security 2013:1–8.

    Google Scholar 

  25. Fink, Glenn A., et al. “Visualizing cyber security: Usable workspaces.” International Workshop on Visualization for Cyber Security IEEE, 2010:45–56.

    Google Scholar 

  26. Sethi, Aneesha, and G. Wills. “Expert-interviews led analysis of EEVi — A model for effective visualization in cyber-security.” Visualization for Cyber Security IEEE, 2017:1–8.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haisheng Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, H., Tang, W., Zou, X., Wang, Y., Zu, Y. (2019). Analysis of Visualization Systems for Cyber Security. In: Patnaik, S., Jain, V. (eds) Recent Developments in Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 752. Springer, Singapore. https://doi.org/10.1007/978-981-10-8944-2_122

Download citation

Publish with us

Policies and ethics