[go: up one dir, main page]

Komlodi et al., 2005 - Google Patents

A user-centered look at glyph-based security visualization

Komlodi et al., 2005

View PDF
Document ID
4728404547347686894
Author
Komlodi A
Rheingans P
Ayachit U
Goodall J
Joshi A
Publication year
Publication venue
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05).

External Links

Snippet

This paper presents the intrusion detection toolkit (IDtk), an information visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design process, in which we identified design guidelines to support ID users. ID analysts protect their networks …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • G06T11/20Drawing from basic elements, e.g. lines or circles
    • G06T11/206Drawing of charts or graphs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30994Browsing or visualization
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30873Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/22Arrangements for maintenance or administration or management of packet switching networks using GUI [Graphical User Interface]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2200/00Indexing scheme for image data processing or generation, in general
    • G06T2200/24Indexing scheme for image data processing or generation, in general involving graphical user interfaces [GUIs]

Similar Documents

Publication Publication Date Title
Komlodi et al. A user-centered look at glyph-based security visualization
Jiang et al. Systematic literature review on cyber situational awareness visualizations
Ball et al. Home-centric visualization of network traffic for security administration
Foresti et al. Visual correlation of network alerts
Erbacher et al. Intrusion and misuse detection in large-scale systems
Shiravi et al. A survey of visualization systems for network security
Guimaraes et al. A survey on information visualization for network and service management
Shi et al. Visual analytics of anomalous user behaviors: A survey
Ji et al. Evaluating visualization approaches to detect abnormal activities in network traffic data
CN109478219B (en) User interface for displaying network analytics
Goodall Introduction to visualization for computer security
Legg Enhancing cyber situation awareness for non-expert users using visual analytics
Karapistoli et al. Wireless sensor network security visualization
Creese et al. Cybervis: visualizing the potential impact of cyber attacks on the wider enterprise
Liao et al. Visualizing graph dynamics and similarity for enterprise network security and management
Mansman et al. Visualization of host behavior for network security
Happa et al. Assessing a decision support tool for SOC analysts
Erbacher Intrusion behavior detection through visualization
Kotenko et al. Vissecanalyzer: A visual analytics tool for network security assessment
Nunnally et al. Navsec: A recommender system for 3d network security visualizations
Garae et al. A full-scale security visualization effectiveness measurement and presentation approach
Cermak et al. Using relational graphs for exploratory analysis of network traffic data
Musa et al. Visualising communication network security attacks
Goodall User requirements and design of a visualization for intrusion detection analysis
Bennett Veils: an ecological interface for computer network defense