2011 IEEE Conference on Visual Analytics Science and Technology (VAST) 2011
DOI: 10.1109/vast.2011.6102491
|View full text |Cite
|
Sign up to set email alerts
|

Geovisual analytics for cyber security: Adopting the GeoViz Toolkit

Abstract: For the VAST 2011 Network Security Mini-Challenge, we adopted geovisual analytic methods and applied them in the field of network security. We used the GeoViz Toolkit [1] to represent cyber security events, by fabricating a simple "geography" of several sets of blocks (one for the workstations, one for the servers, and one for the Internet) using ArcGIS 10 (by ESRI -Environmental System Research Institute). Security data was tabulated using Perl scripts to parse the logs in order to create representations of e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Each block in the heat map represents a record in a log file, arranged in a day (Y axis) to hour (X axis) way with varying colors indicating different sources of logs files. Another example of pixel map design is the system developed by Nicklaus et al [10], which include a bivariate geomap view, a scatterplot view, a parallel coordinate plots view, and a histogram view. Alert frequency and types are clearly described in this design.…”
Section: Single Event Based Visualizationmentioning
confidence: 99%
“…Each block in the heat map represents a record in a log file, arranged in a day (Y axis) to hour (X axis) way with varying colors indicating different sources of logs files. Another example of pixel map design is the system developed by Nicklaus et al [10], which include a bivariate geomap view, a scatterplot view, a parallel coordinate plots view, and a histogram view. Alert frequency and types are clearly described in this design.…”
Section: Single Event Based Visualizationmentioning
confidence: 99%
“…The work in [5] allows for inspecting geographical and time dependent logs, while [9] relies on a geographic representation of the resources, using the GeoViz tooolkit [12]; conversely, we use composite nodes and resources are first aggregated and mapped or directly mapped, according to their cardinality and space constraints. In [11] is proposed the integration of geographical and logical representations.…”
Section: Related Workmentioning
confidence: 99%
“…We processed raw data from the 2011 VAST Challenge 1 (Mini-Challenge 2) to create two "training" scenarios and two "performance" scenarios in both of the interfaces. Raw data was converted into a frequency-based interpretation of the events, as we have done previously (Giacobe & Xu, 2011). Raw data from the vulnerability scan, firewall, Snort IDS system and Windows server were processed into the appropriate hourly summation data types.…”
Section: Development Of Simulation Scenariosmentioning
confidence: 99%