Information Visualization and Visual Data Mining
IEEE Transactions on Visualization and Computer Graphics
HCI '98 Proceedings of HCI on People and Computers XIII
Information Visualization: Perception for Design
Information Visualization: Perception for Design
The Spinning Cube of Potential Doom
Communications of the ACM - Wireless sensor networks
PortVis: a tool for port-based detection of security events
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Attacking information visualization system usability overloading and deceiving the human
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Exploring Three-dimensional Visualization for Intrusion Detection
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
CommunityCommands: command recommendations for software applications
Proceedings of the 22nd annual ACM symposium on User interface software and technology
Nimble cybersecurity incident management through visualization and defensible recommendations
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
A Movie Rating Prediction Algorithm with Collaborative Filtering
ASONAM '10 Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining
Visual Reasoning about Social Networks Using Centrality Sensitivity
IEEE Transactions on Visualization and Computer Graphics
3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security
LCN '12 Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)
Hi-index | 0.00 |
As network attacks increase in complexity, the ability to quickly analyze security data and mitigate the effect of these attacks becomes a difficult problem. To alleviate these challenges, researchers are looking into various two-dimensional (2D) and three-dimensional (3D) visualization tools to detect, identify, and analyze malicious attacks. These visualization tools often require advanced knowledge in networking, visualization, and information security to operate, navigate, and successfully examine malicious attacks. Novice users, deficient in the required advanced knowledge, may find navigation within these visualization tools difficult. Furthermore, expert users may be limited and costly. We discuss the use of a modern recommender system to aid in navigating within a complex 3D visualization for network security applications. We developed a visualization module called NAVSEC, a recommender system prototype for navigating in 3D network security visualization tools. NAVSEC recommends visualizations and interactions to novice users. Given visualization interaction input from a novice user and expert communities, NAVSEC is instrumental in reducing confusion for a novice user while navigating in a 3D visualization. We illustrate NAVSEC with a use-case from an emulated stealthy scanning attack disguised as a file transfer with multiple concurrent connections. We show that using NAVSEC, a novice user's visualization converges towards a visualization used to identify or detect a suspected attack by an expert user. As a result, NAVSEC can successfully guide the novice user in differentiating between complex network attacks and benign legitimate traffic with step-by-step created visualizations and suggested user interactions.