A survey of security visualization for computer network logs

被引:18
|
作者
Zhang, Yanping [1 ]
Xiao, Yang [1 ]
Chen, Min [2 ]
Zhang, Jingyuan [1 ]
Deng, Hongmei [3 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[3] Intelligent Automat Inc, Rockville, MD 20855 USA
基金
美国国家科学基金会;
关键词
network security; security visualization; logs; INTRUSION DETECTION; KNOWLEDGE; ACCOUNTABILITY; MOBILITY;
D O I
10.1002/sec.324
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security is an important area in computer science. Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. Log files are main sources for security analysis. However, log files are not user friendly. It is laborious work to obtain useful information from log files. Compared with log files, visualization systems designed for security purposes provide more perceptive and effective sources for security analysis. Most security visualization systems are based on log files. In this paper, we provide a survey on visualization designs for computer network security. In this survey, we looked into different security visual analytics, and we organized them into five categories. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:404 / 421
页数:18
相关论文
共 50 条
  • [31] Research on Computer Network Security
    Yin, Qinghai
    [J]. 3RD INTERNATIONAL SYMPOSIUM ON MECHATRONICS AND INDUSTRIAL INFORMATICS, (ISMII 2017), 2017, : 235 - 240
  • [32] Contextual filtering and prioritization of computer application logs for security situational awareness
    Cinque, Marcello
    Della Corte, Raffaele
    Pecchia, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 668 - 680
  • [33] Special Issue Computer Network Visualization
    Shen, Xuemin
    [J]. IEEE NETWORK, 2012, 26 (06): : 2 - 2
  • [34] Visualization Techniques for Computer Network Defense
    Beaver, Justin M.
    Steed, Chad A.
    Patton, Robert M.
    Cui, Xiaohui
    Schultz, Matthew
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE X, 2011, 8019
  • [35] POSTER: Security Logs Graph Analytics for Industry Network System
    Meng, Qiaoran
    Oo, Nay
    Lim, Hoon Wei
    Sikdar, Biplab
    [J]. PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 1043 - 1045
  • [36] Usage control in computer security: A survey
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Mori, Paolo
    [J]. COMPUTER SCIENCE REVIEW, 2010, 4 (02) : 81 - 99
  • [37] Security in Network Virtualization: A Survey
    Jee, Seung Hun
    Park, Ji Su
    Shon, Jin Gon
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (04): : 801 - 817
  • [38] Network Security and Metrology: A Survey
    Abouhogail, Reham Abdellatif
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 251 - 270
  • [39] Sensor Network Security: A Survey
    Chen, Xiangqian
    Makki, Kia
    Yen, Kang
    Pissinou, Niki
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02): : 52 - 73
  • [40] Survey on Wireless Network Security
    Rashid Nazir
    Asif Ali laghari
    Kamlesh Kumar
    Shibin David
    Munwar Ali
    [J]. Archives of Computational Methods in Engineering, 2022, 29 : 1591 - 1610