A survey of security visualization for computer network logs

  • Authors:
  • Yanping Zhang;Yang Xiao;Min Chen;Jingyuan Zhang;Hongmei Deng

  • Affiliations:
  • Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL35487–0290, U.S.A.;Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL35487–0290, U.S.A.;School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei430074, China;Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL35487–0290, U.S.A.;Intelligent Automation, Inc., 15400 Calhoun Drive, Suite 400, Rockville, MD20855, U.S.A.

  • Venue:
  • Security and Communication Networks
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network security is an important area in computer science. Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. Log files are main sources for security analysis. However, log files are not user friendly. It is laborious work to obtain useful information from log files. Compared with log files, visualization systems designed for security purposes provide more perceptive and effective sources for security analysis. Most security visualization systems are based on log files. In this paper, we provide a survey on visualization designs for computer network security. In this survey, we looked into different security visual analytics, and we organized them into five categories. Copyright © 2011 John Wiley & Sons, Ltd.