2009 6th International Workshop on Visualization for Cyber Security 2009
DOI: 10.1109/vizsec.2009.5375538
|View full text |Cite
|
Sign up to set email alerts
|

Security visualization tools and IPv6 addresses

Abstract: Visualization is used by security analysts to help detect patterns and trends in large volumes of network traffic data. With IPv6 slowly being deployed around the world, network intruders are beginning to adapt their tools and techniques to work over IPv6 (vs. IPv4). Many tools for visualizing network activity, while useful for detecting large scale attacks and network behavior anomalies still only support IPv4. In this paper, we explore the current state of IPv6 support in some popular security visualization … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Several studies have revealed the importance of firewall management and some security issues when users start to deploy IPv6 [14], [15], [16], [9]. Indirectly, enterprises must protect their own organization firewall in order to sustain their business activities since they are using much more network applications compared to individual user.…”
Section: Frameworkmentioning
confidence: 99%
“…Several studies have revealed the importance of firewall management and some security issues when users start to deploy IPv6 [14], [15], [16], [9]. Indirectly, enterprises must protect their own organization firewall in order to sustain their business activities since they are using much more network applications compared to individual user.…”
Section: Frameworkmentioning
confidence: 99%
“…For the analysis of brute-force password guessing attacks, we recommend using word clouds along with parallel coordinate plots. In the case of IPv6 data sets, we offer two contributions [18]: a white space filtering technique that allows the visualization of the entire populated IPv6 address space, and the use of treemaps to visualize the hierarchy of IPv6 addresses.…”
Section: Proposal Of New Visualization Techniques We Propose a New Vmentioning
confidence: 99%
“…In network security, treemaps have been used to visualize firewall logs [5] and to visualize the structure of IPv6 addresses [18] (see further discussion in Chapter 6). Fischer et al…”
Section: Treemapsmentioning
confidence: 99%
See 2 more Smart Citations