Visualization in Information Security

被引:0
|
作者
Schweitzer, Dino
Fulton, Steven
机构
关键词
visualization; information security;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Information security is a data-rich discipline. Security analysts can be overwhelmed with the amount of data available, whether it is network traffic, audit logs, or IDS alarms. Security monitoring applications need to quickly process this data as they require rapid responses to real-time events. An effective way of dealing with large quantities of data is to take advantage of the human visual system and employ data visualization techniques. Data visualization has a long history in scientific computing and medical applications as well as newer areas such as data mining. Techniques for effective data visualization have significantly evolved over the past several years due to increases in processing power, enhanced display devices, massive data storage capability, and faster transmission speeds. One hardware advance that has strongly impacted real-time visualization is the Graphical Processing Unit (GPU). GPU's are small special-purpose processing devices that are packaged hundreds or thousands of units per chip. This allows parallel processing of vast quantities of data to produce high-quality images in real time. As a result of these advances, experts are extending the traditional fields of visualization to a broad range of new applications. For example, many researchers are now experimenting with innovative ways of applying visualization principles to security applications, and many security products incorporate some type of visualization capability. Dedicated books, articles, workshops, and blogs provide information and forums for interested security professionals to learn about visualization and how to effectively apply it to the security domain. This paper reviews the history and principles of visualization focusing on how it is currently used in the security arena. The paper also discusses current trends in information security visualization research by analyzing and discussing ongoing published visualization projects. These projects focus on techniques such as file visualization, network visualization, log (firewall and intrusion detection) visualization, as well as vulnerability identification and exploits. In addition to a survey of current research efforts, the paper looks at possible future directions for security visualization research and applications.
引用
收藏
页码:288 / 296
页数:9
相关论文
共 50 条
  • [1] Visualization of information security management processes
    Miloslavskaya N.G.
    Tolstoy A.I.
    1600, National Research Nuclear University (09): : 117 - 136
  • [2] Information visualization in information security management for enterprise's information infrastructure
    Miloslavskaya, N.
    Tolstoy, A.
    Birjukov, A.
    Scientific Visualization, 2014, 6 (02): : 74 - 91
  • [3] Method of Constructing a Visualization of Threat Model of Information Security
    Manzhosov, A., V
    Bolodurina, I. P.
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [4] Analytical Visualization Techniques for Security Information and Event Management
    Novikova, Evgenia
    Kotenko, Igor
    PROCEEDINGS OF THE 2013 21ST EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2013, : 519 - 525
  • [5] A survey on security visualization techniques for web information systems
    Dang, Tran Khanh
    Dang, Tran Tri
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2013, 9 (01) : 6 - +
  • [6] Information Visualization Metrics and Methods for Cyber Security Evaluation
    Langton, John T.
    Baker, Alex
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 292 - 294
  • [7] Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation
    Sonmez, Ferda Ozdemir
    Gunel, Banu
    2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 38 - 44
  • [8] Countering security information overload through alert and packet visualization
    Conti, G
    Abdullah, K
    Grizzard, J
    Stasko, J
    Copeland, JA
    Ahamad, M
    Owen, HL
    Lee, C
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2006, 26 (02) : 60 - 70
  • [9] Visualization as an aid for assessing the mission impact of information security breaches
    D'Amico, A
    Salas, S
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 190 - 195
  • [10] Information security insider threat visualization: Theft of intellectual property
    Zaytsev, A.S.
    Malyuk, A.A.
    Scientific Visualization, 2015, 7 (03): : 53 - 68