Introduction to visualization for computer security

被引:19
|
作者
Goodall, J. R. [1 ]
机构
[1] Secure Decis Div Appl Vis Inc, Northport, NY 11768 USA
来源
VIZSEC 2007 | 2008年
关键词
D O I
10.1007/978-3-540-78243-8_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. Automated systems to combat this threat are one potential solution, but most automated systems require vigilant human oversight. This automated approach under-values the strong analytic capabilities of humans. While automation affords opportunities for increased scalability, humans provide the ability to handle exceptions and novel patterns. One method to counteracting the ever increasing cyber threat is to provide the human security analysts with better tools to discover pattems, detect anomalies, identify correlations, and communicate their findings. This is what visualization for computer security (VizSec) researchers and developers are doing. VizSec is about putting robust information visualization tools into the hands of humans to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This chapter is an introduction to the VizSec research community and the papers in this volume.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [1] Introduction to computer security
    De Decker, B
    [J]. STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 377 - 393
  • [2] Computer Security Introduction
    Yost, Jeffrey R.
    [J]. IEEE ANNALS OF THE HISTORY OF COMPUTING, 2015, 37 (02) : 6 - 7
  • [3] Measuring the complexity of computer security visualization designs
    Suo, X.
    Zhu, Y.
    Owen, G. Scott
    [J]. VIZSEC 2007, 2008, : 53 - 66
  • [4] A survey of security visualization for computer network logs
    Zhang, Yanping
    Xiao, Yang
    Chen, Min
    Zhang, Jingyuan
    Deng, Hongmei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : 404 - 421
  • [6] A task centered framework for computer security data visualization
    Suo, Xiaoyuan
    Zhu, Ying
    Owen, Scott
    [J]. VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 87 - 94
  • [7] COMPUTER SECURITY TECHNOLOGY - GUEST EDITORS INTRODUCTION
    AMES, SR
    NEUMANN, PG
    [J]. COMPUTER, 1983, 16 (07) : 10 - 12
  • [8] Introduction to the applications of evolutionary computation in computer security and cryptography
    Isasi, P
    Hernandez, JC
    [J]. COMPUTATIONAL INTELLIGENCE, 2004, 20 (03) : 445 - 449
  • [9] INTRODUCTION TO THE SPECIAL ISSUE ON COMPUTER SECURITY AND STANDARDS - OVERVIEW OF SECURITY-STANDARDS ACTIVITIES
    THURAISINGHAM, B
    WILLIAMS, J
    [J]. COMPUTER STANDARDS & INTERFACES, 1995, 17 (04) : 313 - 313
  • [10] UNSW-NB15 computer security dataset: Analysis through visualization
    Zoghi, Zeinab
    Serpen, Gursel
    [J]. SECURITY AND PRIVACY, 2024, 7 (01)