A survey of security visualization for computer network logs

被引:18
|
作者
Zhang, Yanping [1 ]
Xiao, Yang [1 ]
Chen, Min [2 ]
Zhang, Jingyuan [1 ]
Deng, Hongmei [3 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[3] Intelligent Automat Inc, Rockville, MD 20855 USA
基金
美国国家科学基金会;
关键词
network security; security visualization; logs; INTRUSION DETECTION; KNOWLEDGE; ACCOUNTABILITY; MOBILITY;
D O I
10.1002/sec.324
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security is an important area in computer science. Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. Log files are main sources for security analysis. However, log files are not user friendly. It is laborious work to obtain useful information from log files. Compared with log files, visualization systems designed for security purposes provide more perceptive and effective sources for security analysis. Most security visualization systems are based on log files. In this paper, we provide a survey on visualization designs for computer network security. In this survey, we looked into different security visual analytics, and we organized them into five categories. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:404 / 421
页数:18
相关论文
共 50 条
  • [41] Survey on Wireless Network Security
    Nazir, Rashid
    Laghari, Asif Ali
    Kumar, Kamlesh
    David, Shibin
    Ali, Munwar
    [J]. ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (03) : 1591 - 1610
  • [42] A task centered framework for computer security data visualization
    Suo, Xiaoyuan
    Zhu, Ying
    Owen, Scott
    [J]. VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 87 - 94
  • [43] A Survey and Implementation on Neural Network Visualization
    Leung, Yin Chung
    Chang, Jui-Hung
    Hwang, Ren-Hung
    [J]. 2018 15TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS (I-SPAN 2018), 2018, : 107 - 112
  • [44] A survey of visualization tools for biological network
    Pavlopoulos, Georgios A.
    Wegener, Anna-Lynn
    Schneider, Reinhard
    [J]. BIODATA MINING, 2008, 1 (1)
  • [45] An introduction to and survey of biological network visualization
    Ehlers, Henry
    Brich, Nicolas
    Krone, Michael
    Nöllenburg, Martin
    Yu, Jiacheng
    Natsukawa, Hiroaki
    Yuan, Xiaoru
    Wu, Hsiang-Yun
    [J]. Computers and Graphics, 2025, 126
  • [46] NetViewer:A Visualization Tool for Network Security Events
    Zhang Jiawan
    Yang Peng
    Lu Liangfu
    Chen Lei
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 434 - 437
  • [47] An Interactive Visualization System for Network Security Data
    Li Zheng
    Gang Yu
    Yuntian Zheng
    [J]. Journal of Signal Processing Systems, 2023, 95 : 393 - 405
  • [48] The Research on Network Security Visualization Key Technology
    Li, Xiaoyan
    Wang, Qingxian
    Yang, Lin
    Luo, Xiangyang
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 983 - 988
  • [49] An Interactive Visualization System for Network Security Data
    Zheng, Li
    Yu, Gang
    Zheng, Yuntian
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2023, 95 (2-3): : 393 - 405
  • [50] Computer Science Students' Perception of Computer Network Security
    Cambazoglu, Volkan
    Thota, Neena
    [J]. 2013 LEARNING AND TEACHING IN COMPUTING AND ENGINEERING (LATICE 2013), 2013, : 204 - 207