The information visualizer, an information workspace
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
UIST '93 Proceedings of the 6th annual ACM symposium on User interface software and technology
An analysis of BGP convergence properties
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Stable Internet routing without global coordination
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Case study: interactive visualization for internet security
Proceedings of the conference on Visualization '02
An Eye on Network Intruder-Administrator Shootouts
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Mapping and visualizing the internet
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Detecting Flaws and Intruders with Visual Data Analysis
IEEE Computer Graphics and Applications
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Passive visual fingerprinting of network attack tools
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Home-centric visualization of network traffic for security administration
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Visual Correlation of Network Alerts
IEEE Computer Graphics and Applications
Cyber security through visualization
APVis '06 Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60
Visualizing Internet Routing Changes
IEEE Transactions on Visualization and Computer Graphics
BGPeep: An IP-Space Centered View for Internet Routing Data
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Visualizing Real-Time Network Resource Usage
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
A survey of security visualization for computer network logs
Security and Communication Networks
Hi-index | 0.00 |
The Internet pervades many aspects of our lives and is becoming indispensable to critical functions in areas such as commerce, government, production and general information dissemination. To maintain the stability and efficiency of the Internet, every effort must be made to protect it against various forms of attacks, malicious uses, and errors. A key component in the Internet security effort is the routine examination of Internet routing data, which unfortunately can be too large and complicated to browse directly. We have developed an interactive visualization process which proves to be very effective for the analysis of Internet routing data. In this application paper, we show how each step in the visualization process helps direct the analysis and glean insights from the data. These insights include the discovery of patterns, detection of faults and abnormal events, understanding of event correlations, formation of causation hypotheses, and classification of anomalies. We also discuss lessons learned in our visual analysis study.