Visualization in Information Security

被引:0
|
作者
Schweitzer, Dino
Fulton, Steven
机构
关键词
visualization; information security;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Information security is a data-rich discipline. Security analysts can be overwhelmed with the amount of data available, whether it is network traffic, audit logs, or IDS alarms. Security monitoring applications need to quickly process this data as they require rapid responses to real-time events. An effective way of dealing with large quantities of data is to take advantage of the human visual system and employ data visualization techniques. Data visualization has a long history in scientific computing and medical applications as well as newer areas such as data mining. Techniques for effective data visualization have significantly evolved over the past several years due to increases in processing power, enhanced display devices, massive data storage capability, and faster transmission speeds. One hardware advance that has strongly impacted real-time visualization is the Graphical Processing Unit (GPU). GPU's are small special-purpose processing devices that are packaged hundreds or thousands of units per chip. This allows parallel processing of vast quantities of data to produce high-quality images in real time. As a result of these advances, experts are extending the traditional fields of visualization to a broad range of new applications. For example, many researchers are now experimenting with innovative ways of applying visualization principles to security applications, and many security products incorporate some type of visualization capability. Dedicated books, articles, workshops, and blogs provide information and forums for interested security professionals to learn about visualization and how to effectively apply it to the security domain. This paper reviews the history and principles of visualization focusing on how it is currently used in the security arena. The paper also discusses current trends in information security visualization research by analyzing and discussing ongoing published visualization projects. These projects focus on techniques such as file visualization, network visualization, log (firewall and intrusion detection) visualization, as well as vulnerability identification and exploits. In addition to a survey of current research efforts, the paper looks at possible future directions for security visualization research and applications.
引用
收藏
页码:288 / 296
页数:9
相关论文
共 50 条
  • [31] Rationale Visualization for Safety and Security
    Scheepens, Roeland
    Michels, Steffen
    van de Wetering, Huub
    van Wijk, Jarke J.
    COMPUTER GRAPHICS FORUM, 2015, 34 (03) : 191 - 200
  • [32] Composite security boundary visualization
    Zhou, GZ
    McCalley, JD
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1999, 14 (02) : 725 - 731
  • [33] Introduction to visualization for computer security
    Goodall, J. R.
    VIZSEC 2007, 2008, : 1 - 17
  • [34] Visualization tools for security administrators
    Yurick, W
    FINANCIAL CRYPTOGRAPHY, 2004, 3110 : 112 - 113
  • [35] Graph Drawing for Security Visualization
    Tamassia, Roberto
    Palazzi, Bernardo
    Papamanthou, Charalampos
    GRAPH DRAWING, 2009, 5417 : 2 - 13
  • [36] Reflecting on Visualization for Cyber Security
    Gates, Carrie
    Engle, Sophie
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 275 - 277
  • [37] A Survey on Visualization for Wireless Security
    Jeong, Chi Yoon
    Chang, Beom Hwan
    Na, Jung Chan
    NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 129 - 132
  • [38] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [39] Design of network information visualization security cognition system based on QSOFM network and FR algorithm
    Zhu, Min
    Journal of Cyber Security Technology, 2024, 8 (02) : 146 - 162
  • [40] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252