Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today

作者: D. Lalanne , E. Bertini , P. Hertzog , P. Bados

DOI: 10.1007/978-3-540-78243-8_8

关键词:

摘要: This article proposes to go beyond the standard visualization application for security management, which is usually day-to-day monitoring. For this purpose, it introduces a pyramidal vision of network intelligence and respective role information support not only engineers, but also analysts managers. The paper first our holistic discusses need reduce complexity data in order abstract analysis trends over time further convert decisions into actions. tasks we are currently tackling. two following sections present different ways overview concentrating on specific dimensions security: user centric firstly, alarm temporal secondly. Finally concludes with limitations challenges introduced by approach.

参考文章(25)
G. Conti, J. Grizzard, M. Ahamad, H. Owen, Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries visualization for computer security. pp. 10- 10 ,(2005) , 10.1109/VIZSEC.2005.19
Hideki Koike, Yusuke Hideshima, STARMINE: a visualization system for cyber attacks APVis '06 Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60. pp. 131- 138 ,(2006)
Ben Shneiderman, Stuart K Card, Jock Mackinlay, B Shneiderman, Readings in Information Visualization: Using Vision to Think ,(1999)
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
K. Abdullah, C. Lee, G. Conti, J.A. Copeland, J. Stasko, IDS rainStorm: visualizing IDS alarms visualization for computer security. pp. 1- 10 ,(2005) , 10.1109/VIZSEC.2005.8
J.R. Goodall, W.G. Lutters, P. Rheingans, A. Komlodi, Preserving the big picture: visual network traffic analysis with TNV visualization for computer security. pp. 6- 6 ,(2005) , 10.1109/VIZSEC.2005.17
Gerard Salton, Christopher Buckley, Term Weighting Approaches in Automatic Text Retrieval Information Processing and Management. ,vol. 24, pp. 323- 328 ,(1988) , 10.1016/0306-4573(88)90021-0
Robert Spence, Lisa Tweedie, The Attribute Explorer: information synthesis via exploration Interacting with Computers. ,vol. 11, pp. 137- 146 ,(1998) , 10.1016/S0953-5438(98)00022-8