CyberVis: Visualizing the potential impact of cyber attacks on the wider enterprise

作者: Sadie Creese , Michael Goldsmith , Nick Moffat , Jassim Happa , Ioannis Agrafiotis

DOI: 10.1109/THS.2013.6698979

关键词: Data visualizationBusiness Process Model and NotationBusiness process modelingInformation visualizationEnterprise private networkComputer securityHuman–computer interactionComputer scienceVisualizationHuman visual system modelSituation awareness

摘要: … of data-mining tools and filtering techniques exist to detect and analyze cyber-attacks by … designed to make traffic patterns and impact of an attack tangible to a security analyst. The …

参考文章(11)
Tarik Ibrahim, Steven M. Furnell, Maria Papadaki, Nathan L. Clarke, Assessing the usability of end-user security software trust and privacy in digital business. pp. 177- 189 ,(2010) , 10.1007/978-3-642-15152-1_16
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Stephen Lau, The Spinning Cube of Potential Doom Communications of The ACM. ,vol. 47, pp. 25- 26 ,(2004) , 10.1145/990680.990699
Huw Read, Konstantinos Xynos, Andrew Blyth, Presenting DEViSE: Data Exchange for Visualizing Security Events IEEE Computer Graphics and Applications. ,vol. 29, pp. 6- 11 ,(2009) , 10.1109/MCG.2009.48
Tamara Yu, Richard Lippmann, James Riordan, Stephen Boyer, EMBER Proceedings of the Seventh International Symposium on Visualization for Cyber Security - VizSec '10. pp. 1- 12 ,(2010) , 10.1145/1850795.1850796
Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster, Stephen Boyer, Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR Proceedings of the Seventh International Symposium on Visualization for Cyber Security - VizSec '10. pp. 22- 33 ,(2010) , 10.1145/1850795.1850798
Qi Liao, Aaron Striegel, Nitesh Chawla, Visualizing graph dynamics and similarity for enterprise network security and management Proceedings of the Seventh International Symposium on Visualization for Cyber Security - VizSec '10. pp. 34- 45 ,(2010) , 10.1145/1850795.1850799
Daniel M. Best, Shawn Bohn, Douglas Love, Adam Wynne, William A. Pike, Real-time visualization of network behaviors for situational awareness Proceedings of the Seventh International Symposium on Visualization for Cyber Security - VizSec '10. pp. 79- 90 ,(2010) , 10.1145/1850795.1850805
Hyogon Kim, Inhye Kang, Saewoong Bahk, None, Real-time visualization of network attacks on high-speed links IEEE Network. ,vol. 18, pp. 30- 39 ,(2004) , 10.1109/MNET.2004.1337733
L. Itti, C. Koch, E. Niebur, A model of saliency-based visual attention for rapid scene analysis IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 20, pp. 1254- 1259 ,(1998) , 10.1109/34.730558