A survey of security visualization for computer network logs

被引:18
|
作者
Zhang, Yanping [1 ]
Xiao, Yang [1 ]
Chen, Min [2 ]
Zhang, Jingyuan [1 ]
Deng, Hongmei [3 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[3] Intelligent Automat Inc, Rockville, MD 20855 USA
基金
美国国家科学基金会;
关键词
network security; security visualization; logs; INTRUSION DETECTION; KNOWLEDGE; ACCOUNTABILITY; MOBILITY;
D O I
10.1002/sec.324
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security is an important area in computer science. Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. Log files are main sources for security analysis. However, log files are not user friendly. It is laborious work to obtain useful information from log files. Compared with log files, visualization systems designed for security purposes provide more perceptive and effective sources for security analysis. Most security visualization systems are based on log files. In this paper, we provide a survey on visualization designs for computer network security. In this survey, we looked into different security visual analytics, and we organized them into five categories. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:404 / 421
页数:18
相关论文
共 50 条
  • [1] NViZ: An Interactive Visualization of Network Security Systems Logs
    Meena, Amit Kumar
    Hubballi, Neminath
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [2] A Survey of Visualization Systems for Network Security
    Shiravi, Hadi
    Shiravi, Ali
    Ghorbani, Ali A.
    [J]. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2012, 18 (08) : 1313 - 1329
  • [3] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    [J]. TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
  • [4] Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization
    Slagell, Adam
    Yurcik, William
    [J]. 2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005, : 83 - 92
  • [5] Audit Logs Management and Security - A Survey
    Ali, Ahmad
    Ahmed, Mansoor
    Khan, Abid
    [J]. KUWAIT JOURNAL OF SCIENCE, 2021, 48 (03)
  • [6] Introduction to visualization for computer security
    Goodall, J. R.
    [J]. VIZSEC 2007, 2008, : 1 - 17
  • [7] Information Visualization Applied to Computer Network Security A Case Study of a Wireless Network of a University
    de Camargo, Luiz F.
    Moraes, Alessandro
    Dias, Diego R. C.
    Brega, Jose R. F.
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2020, PT II, 2020, 12250 : 44 - 59
  • [8] Computer Network Visualization
    Goodall, John R.
    Mansmann, Florian
    Gerth, John
    [J]. IEEE NETWORK, 2012, 26 (06): : 4 - 5
  • [9] A Survey on Visualization for Wireless Security
    Jeong, Chi Yoon
    Chang, Beom Hwan
    Na, Jung Chan
    [J]. NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 129 - 132
  • [10] A Visualization Method Based on Graph Database in Security Logs Analysis
    Tang, Xinyu
    Ma, Chunguang
    Yu, Min
    Liu, Chao
    [J]. 2017 6TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE (ICAMCS 2017), 2017, : 82 - 89