Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
NAVSEC: a recommender system for 3D network security visualizations
Nunnally T., Abdullah K., Uluagac A., Copeland J., Beyah R.  VizSec 2013 (Proceedings of the 10th Workshop on Visualization for Cyber Security, Atlanta, GA, Oct 14, 2013)41-48.2013.Type:Proceedings
Date Reviewed: Dec 27 2013

The focus of this paper is to help system and network administrators recognize attacks on a network using a 3D visualization tool to detect, identify, and analyze traffic. Such visualization can be extremely complex in real-world scenarios, depending on the type of attacks and the network topology. In particular, the authors discuss the use of a modern recommender system to aid in navigating within complex 3D visualization tools. They propose NAVSEC, a recommender system prototype for navigating within 3D network security visualization tools. NAVSEC helps in part by recommending visualizations and interactions to novice users. Recommender systems are widely used by websites like Amazon and eBay, for example, to provide suggestions for goods based on user behavior.

The use of a 3D visualization tool in network security is not a novel approach. Small network topologies can easily rely on the use of text-based reports. However, when the number of nodes, services, and attacks increases, such text-based approaches become unsustainable. Three-dimensional visualization tools play a crucial role in helping system administrators find network traffic patterns, either malicious or not. When the network topology becomes huge, and the number of nodes and interactions are too many, 3D visualization tools also lose their effectiveness. In particular, novice users find it difficult to navigate inside the views of such tools.

The authors present NAVSEC, a recommender system based on the nearest neighbor algorithm. This learning algorithm “uses a knowledge base of expert users.” The authors show that when using such an algorithm, the number of views of novice users converges to the number of views of experts, thus reaching the defined achievement. The authors also provide a motivation case: stealthy port scanning attacks. NAVSEC is available for download.

Reviewer:  Massimiliano Masi Review #: CR141835 (1403-0207)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
User Interfaces (H.5.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy