VizSEC 2007
Proceedings of the Workshop on Visualization for Computer Security
Gebonden Engels 2008 2008e druk 9783540782421Samenvatting
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.
Specificaties
Lezersrecensies
Inhoudsopgave
3. Adapting Personas for Use in Security Visualization Design - Jennifer Stoll, David McColgin, Michelle Gregory, Vern Crow, W. Keith Edwards
4. Measuring the Complexity of Computer Security Visualization Designs - Xiaoyuan Suo, Ying Zhu, and G. Scott Owen
5. Integrated Environment Management for Information Operations Testbeds - Tamara H. Yu, Benjamin W. Fuller, John H. Bannick, Lee M. Rossey, and Robert K. Cunningham Section 2: Network Security 6. Visual Analysis of Network Flow Data with Timelines and Event Plots - Doantam Phan, John Gerth, Marcia Lee, Andreas Paepcke and Terry Winograd
7. NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior - Teryl Taylor, Stephen Brooks and John McHugh
8. Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today - Denis Lalanne, Enrico Bertini, Patrick Hertzog and Pedro Bados
9. Visualizing network security events using compound glyphs from a service-oriented perspective - Jason Pearlman and Penny Rheingans
10. High level Internet Scale traffic visualization using Hilbert curve mapping Barry Irwin and Nick Pilkington Section 3: Communication, Characterization, and Context 11. Visalert: From Idea to Product - Stefano Foresti
12. Visually Understanding Jam Resistant Communication - Dino Schweitzer, Leemon Baird, and William Bahn
13. Visualization of Host Behavior for Network Security - Florian Mansmann, Lorenz Meier, and Daniel A. Keim
14. Putting Security in Context: Visual Correlation of Network Activity with Real-World Information - William A. Pike, Chad Scherrer, and Sean Zabriskie Section 4: Attack Graphs and Scans 15. An Interactive Attack Graph Cascade and Reachability Display - Leevar Williams, Richard Lippmann, and Kyle Ingols
16. Intelligent Classification and Visualization of Network Scans - Chris Muelder, Lei Chen, Russell Thomason, Kwan-Liu Ma, and Tony Bartoletti
17. Using InetVis to evaluate Snort and Bro scan detection on a network telescope -Barry V.W. Irwin and Jean-Pierre van Riel
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan