메뉴 건너뛰기




Volumn 18, Issue 8, 2012, Pages 1313-1329

A survey of visualization systems for network security

Author keywords

Information visualization; network security visualization; visualization techniques

Indexed keywords

DATA SOURCE; INFORMATION VISUALIZATION; INFORMATIVE TABLES; NOVEL TECHNIQUES; SECURITY VISUALIZATION; VISUAL SYSTEMS; VISUALIZATION SYSTEM; VISUALIZATION TECHNIQUE;

EID: 84862606327     PISSN: 10772626     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVCG.2011.144     Document Type: Review
Times cited : (234)

References (90)
  • 4
    • 0242414940 scopus 로고    scopus 로고
    • Intrusion and misuse detection in large-scale systems
    • Jan./Feb.
    • R. Erbacher, K. Walker, and D. Frincke, "Intrusion and Misuse Detection in Large-Scale Systems," IEEE Computer Graphics and Applications, vol. 22, no. 1, pp. 38-48, Jan./Feb. 2002.
    • (2002) IEEE Computer Graphics and Applications , vol.22 , Issue.1 , pp. 38-48
    • Erbacher, R.1    Walker, K.2    Frincke, D.3
  • 6
    • 84948658749 scopus 로고    scopus 로고
    • Tudumi: Information visualization system for monitoring and auditing computer logs
    • T. Takada and H. Koike, "Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs," Proc. Sixth Int'l Conf. Information Visualisation, pp. 570-576, 2002.
    • (2002) Proc. Sixth Int'l Conf. Information Visualisation , pp. 570-576
    • Takada, T.1    Koike, H.2
  • 19
    • 4243116400 scopus 로고    scopus 로고
    • The spinning cube of potential doom
    • S. Lau, "The Spinning Cube of Potential Doom," Comm. the ACM, vol. 47, no. 6, pp. 25-26, 2004.
    • (2004) Comm. The ACM , vol.47 , Issue.6 , pp. 25-26
    • Lau, S.1
  • 23
    • 84862625318 scopus 로고    scopus 로고
    • 2011. Palo Alto Networks
    • Re-Inventing Network Security. Palo Alto Networks.(2011) http://www.paloaltonetworks.com/literature/whitepapers/Re-inventing-Net work-Security.pdf, 2011.
    • (2011) Re-Inventing Network Security
  • 24
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-Detection alerts
    • Recent Advances in Intrusion Detection
    • H. Debar and A. Wespi, "Aggregation and Correlation of Intrusion-Detection Alerts," Proc. Fourth Int'l Symp. Recent Advances in Intrusion Detection, pp. 85-103, 2001. (Pubitemid 33352002)
    • (2001) Lecture Notes in Computer Science , Issue.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 43
    • 34248377875 scopus 로고    scopus 로고
    • SVision: A novel visual network-anomaly identification technique
    • DOI 10.1016/j.cose.2006.10.001, PII S0167404806001507
    • I.-V. Onut and A.A. Ghorbani, "Svision: A Novel Visual Network-Anomaly Identification Technique," Computers Security, vol. 26, no. 3, pp. 201-212, 2007. (Pubitemid 46734414)
    • (2007) Computers and Security , vol.26 , Issue.3 , pp. 201-212
    • Onut, I.-V.1    Ghorbani, A.A.2
  • 44
    • 35948957403 scopus 로고    scopus 로고
    • Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
    • DOI 10.1109/TVCG.2007.70522
    • F. Mansmann, D. Keim, S. North, B. Rexroad, and D. Sheleheda, "Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats," IEEE Trans. Visualization and Computer Graphics, vol. 13, no. 6, pp. 1105-1112, Nov./Dec. 2007. (Pubitemid 350076578)
    • (2007) IEEE Transactions on Visualization and Computer Graphics , vol.13 , Issue.6 , pp. 1105-1112
    • Mansmann, F.1    Keim, D.A.2    North, S.C.3    Rexroad, B.4    Sheleheda, D.5
  • 45
    • 47349099942 scopus 로고    scopus 로고
    • Spiralview: Towards security policies assessment through visual correlation of network resources with evolution of alarms
    • E. Bertini, P. Hertzog, and D. Lalanne, "Spiralview: Towards Security Policies Assessment through Visual Correlation of Network Resources with Evolution of Alarms," Proc. IEEE Symp. Visual Analytics Science and Technology, pp. 139-146, 2007.
    • (2007) Proc. IEEE Symp. Visual Analytics Science and Technology , pp. 139-146
    • Bertini, E.1    Hertzog, P.2    Lalanne, D.3
  • 57
    • 0029004440 scopus 로고
    • Toward a theory of situation awareness in dynamic systems: Situation awareness
    • M. Endsley, "Toward a Theory of Situation Awareness in Dynamic Systems: Situation Awareness," Human Factors, vol. 37, no. 1, pp. 32-64, 1995.
    • (1995) Human Factors , vol.37 , Issue.1 , pp. 32-64
    • Endsley, M.1
  • 62
    • 33845604957 scopus 로고    scopus 로고
    • The perceptual scalability of visualization
    • DOI 10.1109/TVCG.2006.184
    • B. Yost and C. North, "The Perceptual Scalability of Visualization," IEEE Trans. Visualization and Computer Graphics, vol. 12, no. 5, pp. 837-844, Sept./Oct. 2006. (Pubitemid 44955611)
    • (2006) IEEE Transactions on Visualization and Computer Graphics , vol.12 , Issue.5 , pp. 837-844
    • Yost, B.1    North, C.2
  • 64
    • 33845675644 scopus 로고    scopus 로고
    • Balancing systematic and flexible exploration of social networks
    • DOI 10.1109/TVCG.2006.122
    • A. Perer and B. Shneiderman, "Balancing Systematic and Flexible Exploration of Social Networks," IEEE Trans. Visualization and Computer Graphics, vol. 12, no. 5, pp. 693-700, Sept./Oct. 2006. (Pubitemid 44955593)
    • (2006) IEEE Transactions on Visualization and Computer Graphics , vol.12 , Issue.5 , pp. 693-700
    • Perer, A.1    Shneiderman, B.2
  • 66
    • 78651326104 scopus 로고    scopus 로고
    • Focus-based filtering + clustering technique for power-law networks with small world phenomenon
    • F. Boutin, J. Thièvre, and M. Hascoët, "Focus-Based Filtering + Clustering Technique for Power-Law Networks with Small World Phenomenon," Proc. Conf. Visualization and Data Analysis '06, vol. 6060, no. 1, 2006.
    • (2006) Proc. Conf. Visualization and Data Analysis '06 , vol.6060 , Issue.1
    • Boutin, F.1    Thièvre, J.2    Hascoët, M.3
  • 69
    • 33749524265 scopus 로고    scopus 로고
    • Exploring three-dimensional visualization for intrusion detection
    • DOI 10.1109/VIZSEC.2005.1532073, 1532073, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
    • A. Oline and D. Reiners, "Exploring Three-dimensional Visualization for Intrusion Detection," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 113-120, 2005. (Pubitemid 44523255)
    • (2005) IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings , pp. 113-120
    • Ohne, A.1    Reiners, D.2
  • 72
    • 0034315717 scopus 로고    scopus 로고
    • Mapping semantic information in virtual space: Dimensions, variance and individual differences
    • DOI 10.1006/ijhc.2000.0417
    • S.J. Westerman and T. Cribbin, "Mapping Semantic Information in Virtual Space: Dimensions, Variance and Individual Differences," Int'l J. Human-Computer Studies, vol. 53, no. 5, pp. 765-787, 2000. (Pubitemid 32032820)
    • (2000) International Journal of Human Computer Studies , vol.53 , Issue.5 , pp. 765-787
    • Westerman, S.J.1    Cribbin, T.2
  • 76
    • 0242493653 scopus 로고    scopus 로고
    • Why not make interfaces better than 3d reality?
    • Nov./Dec.
    • B. Shneiderman, "Why Not Make Interfaces Better than 3D Reality?," IEEE Computer Graphics and Applications, vol. 23, no. 6, pp. 12-15, Nov./Dec. 2003.
    • (2003) IEEE Computer Graphics and Applications , vol.23 , Issue.6 , pp. 12-15
    • Shneiderman, B.1
  • 78
    • 84862620665 scopus 로고    scopus 로고
    • On pseudonymization of audit data for intrusion detection
    • Designing Privacy Enhancing Technologies
    • J. Biskup and U. Flegel, "On Pseudonymization of Audit Data for Intrusion Detection," Proc. Int'l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 161-180, 2001. (Pubitemid 33241793)
    • (2001) Lecture Notes in Computer Science , Issue.2009 , pp. 161-180
    • Biskup, J.1    Flegel, U.2
  • 79
    • 84862620662 scopus 로고    scopus 로고
    • Tcpdpriv 2011
    • G. Minshall (2011) Tcpdpriv, http://ita.ee.lbl.gov/html/contrib/tcpdpriv. html 2011.
    • (2011)
    • Minshall, G.1
  • 82
    • 1242310066 scopus 로고    scopus 로고
    • A high-level programming environment for packet trace anonymization and transformation
    • R. Pang and V. Paxson, "A High-Level Programming Environment for Packet Trace Anonymization and Transformation," Proc. SIGCOMM '03, pp. 339-351, 2003.
    • (2003) Proc. SIGCOMM '03 , pp. 339-351
    • Pang, R.1    Paxson, V.2
  • 84
    • 0034300797 scopus 로고    scopus 로고
    • Anomaly-based intrusion detection: Privacy concerns and other problems
    • E. Lundin and E. Jonsson, "Anomaly-Based Intrusion Detection: Privacy Concerns and Other Problems," Computer Networks, vol. 34, pp. 623-640, 2000.
    • (2000) Computer Networks , vol.34 , pp. 623-640
    • Lundin, E.1    Jonsson, E.2
  • 88
    • 84862606352 scopus 로고    scopus 로고
    • 2011.
    • The PREDICT (2011) website. http://www.predict.org, 2011.
    • (2011) The PREDICT website
  • 89
    • 84862620666 scopus 로고    scopus 로고
    • 2011.
    • The Skaion (2011) website. http://www.skaion.com, 2011.
    • (2011) The Skaion website
  • 90
    • 84862620663 scopus 로고    scopus 로고
    • 2011
    • USC/ISI Network Traces (2011) . http://www.isi.edu/ant/index.html, 2011.
    • (2011) USC/ISI Network Traces


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.