Introduction to visualization for computer security

被引:19
|
作者
Goodall, J. R. [1 ]
机构
[1] Secure Decis Div Appl Vis Inc, Northport, NY 11768 USA
来源
VIZSEC 2007 | 2008年
关键词
D O I
10.1007/978-3-540-78243-8_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. Automated systems to combat this threat are one potential solution, but most automated systems require vigilant human oversight. This automated approach under-values the strong analytic capabilities of humans. While automation affords opportunities for increased scalability, humans provide the ability to handle exceptions and novel patterns. One method to counteracting the ever increasing cyber threat is to provide the human security analysts with better tools to discover pattems, detect anomalies, identify correlations, and communicate their findings. This is what visualization for computer security (VizSec) researchers and developers are doing. VizSec is about putting robust information visualization tools into the hands of humans to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This chapter is an introduction to the VizSec research community and the papers in this volume.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [31] COMPUTER SECURITY
    BROWN, MJC
    [J]. BRITISH MEDICAL JOURNAL, 1983, 287 (6400): : 1226 - 1226
  • [32] COMPUTER SECURITY
    DAHL, WA
    [J]. HARVARD BUSINESS REVIEW, 1984, 62 (04) : 188 - 188
  • [33] COMPUTER SECURITY
    Cass, Stephen
    Naone, Erica
    Garfinkel, Simson
    Talbot, David
    Lemos, Robert
    [J]. TECHNOLOGY REVIEW, 2010, 113 (04) : 59 - 70
  • [34] COMPUTER SECURITY
    MOORE, PG
    [J]. HARVARD BUSINESS REVIEW, 1985, 63 (06) : 228 - 228
  • [35] COMPUTER SECURITY
    SPINDLE, L
    [J]. RADIO-ELECTRONICS, 1984, 55 (02): : 111 - &
  • [36] COMPUTER SECURITY
    不详
    [J]. DUNS BUSINESS MONTH, 1982, 120 (06): : 94 - &
  • [37] COMPUTER SECURITY
    FRIEDMAN, H
    [J]. RADIO-ELECTRONICS, 1985, 56 (06): : 78 - 79
  • [38] COMPUTER SECURITY
    BRANSTAD, DK
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1985, 23 (07) : 10 - 11
  • [39] Computer security
    Gollmann, Dieter
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (05): : 544 - 554
  • [40] Computer Network Visualization
    Goodall, John R.
    Mansmann, Florian
    Gerth, John
    [J]. IEEE NETWORK, 2012, 26 (06): : 4 - 5