Scatter (and other) plots for visualizing user profiling data and network traffic

  • Authors:
  • Tom Goldring

  • Affiliations:
  • National Security Agency

  • Venue:
  • Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The scatterplot continues to be one of the most useful tools for visualizing numeric data, however what we typically encounter in Computer Security is categorical and/or textual in nature, and how to convert it into a form where scatterplots apply is not always obvious. We outline some simple ideas for doing this and illustrate with two "real data" case studies: User Profiling and Network Traffic. In both cases the results can be quite surprising.