Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Flexible web visualization for alert-based network security analytics
Hao L., Healey C., Hutchinson S.  VizSec 2013 (Proceedings of the 10th Workshop on Visualization for Cyber Security, Atlanta, GA, Oct 14, 2013)33-40.2013.Type:Proceedings
Date Reviewed: Jan 3 2014

Visualization, in general, helps reveal patterns and relationships in data. This paper focuses on how to support network security analysis using analyst-driven visualization. A web-based data visualization framework is described. This framework was built to help network security analysts at the US Army Research Laboratory to better observe and identify malicious network activities based on alerts collected by sensors across the network.

The design of the system was intended to meet requirements related to end users’ mental models and working environments, to achieve “configurability, accessibility, scalability, and fit with existing analysis strategies.” In the framework, MySQL was selected for retrieval and management of data sources, and a JavaScript charting library (RGraph) was adopted and modified to implement flexible user interactions and correlation capability. The paper concludes with an example analysis session in which the visualization system is used by a professional network analyst.

Although the practices described in the paper relate to the specialized field of network security, the methodology can be applied to building other domain-specific visualization frameworks. Thus, I recommend this paper to the broad visualization community.

Reviewer:  Xiangdong Che Review #: CR141857 (1403-0234)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Data Mining (H.2.8 ... )
 
 
Visual (I.6.8 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy