Komlodi et al., 2005 - Google Patents
A user-centered look at glyph-based security visualizationKomlodi et al., 2005
View PDF- Document ID
- 4728404547347686894
- Author
- Komlodi A
- Rheingans P
- Ayachit U
- Goodall J
- Joshi A
- Publication year
- Publication venue
- IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05).
External Links
Snippet
This paper presents the intrusion detection toolkit (IDtk), an information visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design process, in which we identified design guidelines to support ID users. ID analysts protect their networks …
- 238000004458 analytical method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
- G06T11/20—Drawing from basic elements, e.g. lines or circles
- G06T11/206—Drawing of charts or graphs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30994—Browsing or visualization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/22—Arrangements for maintenance or administration or management of packet switching networks using GUI [Graphical User Interface]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2200/00—Indexing scheme for image data processing or generation, in general
- G06T2200/24—Indexing scheme for image data processing or generation, in general involving graphical user interfaces [GUIs]
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Komlodi et al. | A user-centered look at glyph-based security visualization | |
| Jiang et al. | Systematic literature review on cyber situational awareness visualizations | |
| Ball et al. | Home-centric visualization of network traffic for security administration | |
| Foresti et al. | Visual correlation of network alerts | |
| Erbacher et al. | Intrusion and misuse detection in large-scale systems | |
| Shiravi et al. | A survey of visualization systems for network security | |
| Guimaraes et al. | A survey on information visualization for network and service management | |
| Shi et al. | Visual analytics of anomalous user behaviors: A survey | |
| Ji et al. | Evaluating visualization approaches to detect abnormal activities in network traffic data | |
| CN109478219B (en) | User interface for displaying network analytics | |
| Goodall | Introduction to visualization for computer security | |
| Legg | Enhancing cyber situation awareness for non-expert users using visual analytics | |
| Karapistoli et al. | Wireless sensor network security visualization | |
| Creese et al. | Cybervis: visualizing the potential impact of cyber attacks on the wider enterprise | |
| Liao et al. | Visualizing graph dynamics and similarity for enterprise network security and management | |
| Mansman et al. | Visualization of host behavior for network security | |
| Happa et al. | Assessing a decision support tool for SOC analysts | |
| Erbacher | Intrusion behavior detection through visualization | |
| Kotenko et al. | Vissecanalyzer: A visual analytics tool for network security assessment | |
| Nunnally et al. | Navsec: A recommender system for 3d network security visualizations | |
| Garae et al. | A full-scale security visualization effectiveness measurement and presentation approach | |
| Cermak et al. | Using relational graphs for exploratory analysis of network traffic data | |
| Musa et al. | Visualising communication network security attacks | |
| Goodall | User requirements and design of a visualization for intrusion detection analysis | |
| Bennett | Veils: an ecological interface for computer network defense |