Information Visualization Applied to Computer Network Security A Case Study of a Wireless Network of a University

被引:0
|
作者
de Camargo, Luiz F. [1 ]
Moraes, Alessandro [1 ]
Dias, Diego R. C. [2 ]
Brega, Jose R. F. [1 ]
机构
[1] Univ Estadual Paulista, Sao Paulo, Brazil
[2] Univ Fed Sao Joao del Rei, Sao Joao Del Rei, Brazil
关键词
Information visualization; Networks; Security; Management; Network monitoring;
D O I
10.1007/978-3-030-58802-1_4
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Computer networks are becoming increasingly vital to the activities of organizations, and their monitoring is necessary to ensure proper functioning. The use of the human cognitive process in decision-making through information visualization (IV) is a viable option for large amounts of data, such as those generated in network monitoring. Considering the need to monitor modern computer networks and the quality gain when using visualization techniques, the objective was to conduct a review study to understand the process of building a monitoring tool using information visualization resources and, from this review, follow with a case study through a tool for visualization application in a university wireless network management. To this end, a systematic literature review was performed, and then a survey of requirements was conducted with the university network managers. With the analysis of the data from the review and the survey, a tool was specified and developed, evaluated in several units of the university. In this way, the results from the review and the requirements survey are observed in time, which allowed the development of a solution using the observed trends, validating them in the use and evaluation of the tool. The main contribution of the work is the resulting tool and its impact on the management of the university wireless network, facilitating the activities of managers.
引用
收藏
页码:44 / 59
页数:16
相关论文
共 50 条
  • [31] Wireless network security
    Shen, XMS
    Lin, CA
    Sun, YL
    Pan, JP
    Langendoerfer, P
    Cao, ZF
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03): : 269 - 271
  • [32] Case study: Visualization and information retrieval techniques for network intrusion detection
    Atkison, T
    Pensy, K
    Nicholas, C
    Ebert, D
    Atkison, R
    Morris, C
    [J]. DATA VISUALIZATION 2001, 2001, : 283 - +
  • [33] Wireless Network Security
    Yang Xiao
    Yi-Bing Lin
    Ding-Zhu Du
    [J]. EURASIP Journal on Wireless Communications and Networking, 2006
  • [34] Wireless network security
    Xiao, Yang
    Lin, Yi-Bing
    Du, Ding-Zhu
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
  • [35] Wireless Network Security
    Yang Xiao
    Hui Chen
    Shuhui Yang
    Yi-Bing Lin
    Ding-Zhu Du
    [J]. EURASIP Journal on Wireless Communications and Networking, 2009
  • [36] WIRELESS NETWORK SECURITY
    Skea, Neil
    Maharaj, Manoj S.
    [J]. BUSINESS MANAGEMENT CONFERENCE 2009, 2009, : 646 - 659
  • [37] Wireless Network Security
    Xiao, Yang
    Chen, Hui
    Yang, Shuhui
    Lin, Yi-Bing
    Du, Ding-Zhu
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
  • [38] PROPOSAL OF SECURITY PROTOCOLS FOR THE LOCAL WIRELESS NETWORK OF THE CIENFUEGOS UNIVERSITY
    Gonzalez Paz, Alex
    Beltran Casanova, David
    Fuentes Gari, Ernesto Roberto
    [J]. REVISTA UNIVERSIDAD Y SOCIEDAD, 2016, 8 (04): : 128 - 135
  • [39] Computer network security
    Janson, P
    Rudin, H
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 785 - 786
  • [40] Information under the network environment using computer information security technology
    Sun, Qing Li
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 474 - 477