Visualization in Information Security

被引:0
|
作者
Schweitzer, Dino
Fulton, Steven
机构
关键词
visualization; information security;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Information security is a data-rich discipline. Security analysts can be overwhelmed with the amount of data available, whether it is network traffic, audit logs, or IDS alarms. Security monitoring applications need to quickly process this data as they require rapid responses to real-time events. An effective way of dealing with large quantities of data is to take advantage of the human visual system and employ data visualization techniques. Data visualization has a long history in scientific computing and medical applications as well as newer areas such as data mining. Techniques for effective data visualization have significantly evolved over the past several years due to increases in processing power, enhanced display devices, massive data storage capability, and faster transmission speeds. One hardware advance that has strongly impacted real-time visualization is the Graphical Processing Unit (GPU). GPU's are small special-purpose processing devices that are packaged hundreds or thousands of units per chip. This allows parallel processing of vast quantities of data to produce high-quality images in real time. As a result of these advances, experts are extending the traditional fields of visualization to a broad range of new applications. For example, many researchers are now experimenting with innovative ways of applying visualization principles to security applications, and many security products incorporate some type of visualization capability. Dedicated books, articles, workshops, and blogs provide information and forums for interested security professionals to learn about visualization and how to effectively apply it to the security domain. This paper reviews the history and principles of visualization focusing on how it is currently used in the security arena. The paper also discusses current trends in information security visualization research by analyzing and discussing ongoing published visualization projects. These projects focus on techniques such as file visualization, network visualization, log (firewall and intrusion detection) visualization, as well as vulnerability identification and exploits. In addition to a survey of current research efforts, the paper looks at possible future directions for security visualization research and applications.
引用
收藏
页码:288 / 296
页数:9
相关论文
共 50 条
  • [21] Information visualization
    Munzner, T
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2002, 22 (01) : 20 - 21
  • [22] Information visualization
    Zhu, B
    Chen, HC
    ANNUAL REVIEW OF INFORMATION SCIENCE AND TECHNOLOGY, 2005, 39 : 139 - 177
  • [23] Information visualization
    Gershon, N
    Eick, SG
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 1997, 17 (04) : 29 - 31
  • [24] Visualization of Information
    Song, Daegene
    NEUROQUANTOLOGY, 2018, 16 (01) : 32 - 36
  • [25] Information visualization
    Mitre Corp, McLean, United States
    IEEE Comput Graphics Appl, 4 (29-31):
  • [26] Information visualization
    Chen, Chaomei
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (04) : 387 - 403
  • [27] A Review on Information, Information Security and Security Processes
    Canbek, Gurol
    Sagiroglu, Seref
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
  • [28] Visualization schemas for flexible information visualization
    North, C
    Conklin, N
    Saini, V
    INFOVIS 2002: IEEE SYMPOSIUM ON INFORMATION VISUALIZATION 2002, 2002, : 15 - 22
  • [29] Information and Information Security
    Henno, Jaak
    INFORMATION MODELLING AND KNOWLEDGE BASES XXVII, 2016, 280 : 103 - 120
  • [30] The Future of Security Visualization: Lessons from Network Visualization
    Harrison, Lane
    Lu, Aidong
    IEEE NETWORK, 2012, 26 (06): : 6 - 11