Atjaunināt sīkdatņu piekrišanu

VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security 2008 ed. [Hardback]

Edited by , Edited by , Edited by
  • Formāts: Hardback, 273 pages, height x width: 235x155 mm, weight: 720 g, XV, 273 p., 1 Hardback
  • Sērija : Mathematics and Visualization
  • Izdošanas datums: 12-Jun-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540782427
  • ISBN-13: 9783540782421
  • Hardback
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 273 pages, height x width: 235x155 mm, weight: 720 g, XV, 273 p., 1 Hardback
  • Sērija : Mathematics and Visualization
  • Izdošanas datums: 12-Jun-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540782427
  • ISBN-13: 9783540782421
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.

Recenzijas

From the reviews:









"This book is a collection of several very useful contributions. The introductory paper by the editors is quite useful as an overview of the field, and could very well be recommended reading for a course. I recommend this book to anyone who is involved in, or wants to get up to speed with the use of, visualization techniques in computer security." (Stefano Zanero, ACM Computing Reviews, October, 2008)

Introduction to Visualization for Computer Security 1
J.R. Goodall
1 Computer Security
1
2 Information Visualization
3
3 Visualization for Computer Network Defense
5
3.1 Data Sources for Computer Network Defense
6
3.2 VizSec to Support Computer Network Defense
6
4 Papers in This Volume
11
4.1 Users and Testing
11
4.2 Network Security
13
4.3 Communication, Characterization, and Context
14
4.4 Attack Graphs and Scans
15
5 Conclusion
15
References
16
The Real Work of Computer Network Defense Analysts 19
A. D'Amico and K. Whitley
1 Introduction
19
2 Related Work
20
3 Methods
22
4 Findings
23
4.1 Data Transformation in CND Analysis
24
4.2 CND Analysis Roles
27
4.3 CND Analysis Workflow Across Organizations
29
5 Implications for Visualization
33
5.1 Visualization Across the CND Workflow
33
5.2 Visualization as Part of a CND Analysis Environment
35
References
36
Adapting Personas for Use in Security Visualization Design 39
J. Stoll, D. McColgin, M. Gregory, V. Crow, and W.K. Edwards
1 Introduction
39
2 Overview of the Personas Method and Related Work
40
2.1 Personas Method
41
2.2 Related Work
42
3 Case Study: First Look
43
3.1 Five Steps to Persona Implementation
43
3.2 Discussion
49
4 Application to Security Visualizations
49
5 Conclusion
51
References
51
Measuring the Complexity of Computer Security Visualization Designs 53
X. Suo, Y. Zhu, and G. Scott Owen
1 Introduction
53
2 Related Work
54
3 Technical Approach
55
3.1 Hierarchical Analysis of Data Visualization
57
3.2 Visual Integration
57
3.3 Separable Dimensions for Visual Units
58
3.4 Interpreting the Values of Visual Attributes
60
3.5 Efficiency of Visual Search
61
3.6 Case Study with RUMINT
63
4 Future Work
65
5 Conclusion
65
References
66
Integrated Environment Management for Information Operations Testbeds 67
T.H. Yu, B.W. Fuller, J.H. Bannick, L.M. Rossey, and R.K. Cunningham
1 Introduction
67
2 Related Work
68
3 Technical Approach
70
3.1 LARIAT Overview
70
3.2 Design Goals
72
3.3 Interface and Visualization
72
4 Future Work
80
5 Conclusions
81
References
82
Visual Analysis of Network Flow Data with Timelines and Event Plots 85
D. Phan, J. Gerth, M. Lee, A. Paepcke, and T. Winograd
1 Introduction
85
2 Network Flow Data
86
2.1 Flow Sensor
86
2.2 Database Repository
87
3 The Investigation Process
87
4 Flow Maps
88
5 Progressive Multiples of Timelines and Event Plots
89
6 A Case of Mysterious IRC Traffic
90
7 Related Work
96
8 Future Work and Conclusions
98
References
98
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior 101
T. Taylor, S. Brooks, and J. McHugh
1 Introduction
101
2 Related Work
102
3 Technical Approach
105
3.1 NetBytes Viewer User Interface
105
3.2 User Interaction
107
3.3 Implementation Details
110
3.4 Case Studies
110
4 Future Work
113
5 Conclusions
114
References
114
Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today 115
D. Lalanne, E. Bertini, P. Hertzog, and P. Bados
1 Introduction
115
2 Background
117
3 On the Need to Support Visual Analysis
118
3.1 Types of Analyses
120
3.2 Analysis Tasks
120
4 User and Application Centric Views of the Corporate Network
122
4.1 The RadViz: Visually Grouping Similar Objects
122
4.2 The OriginalityView: Plotting the Uncommon
124
5 Alarm/Event Centric Views
126
6 Limitations and Challenges
128
7 Conclusion
129
References
129
Visualizing Network Security Events Using Compound Glyphs From a Service-Oriented Perspective 131
J. Pearlman and P. Rheingans
1 Introduction
131
2 Related Work
133
3 Technical Approach
134
3.1 Network Node Glyph
134
3.2 Layout
136
3.3 Comparing to a Model
137
3.4 Results
138
4 Future Work
144
5 Conclusions
145
References
145
High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping 147
B. Irwin and N. Pilkington
1 Introduction
147
2 Related Work
148
3 Technical Approach
150
4 Results
151
4.1 Output Analysis
153
4.2 Other Applications
154
5 Future Work
156
6 Conclusions
157
References
158
VisAlert: From Idea to Product 159
S. Foresti and J. Agutter
1 Introduction
159
1.1 The Project and Team
160
1.2 The VisAlert Metaphor
160
2 Related Work
161
2.1 Visualization of Network Security
161
2.2 Design
162
2.3 Inter-Disciplinary Collaboration
163
3 Technical Approach
163
3.1 The Team Dynamics
163
3.2 The Design Process
164
3.3 Sketches
165
3.4 Refined Conceptual Ideas
167
3.5 Implementation
169
4 Future Work
171
5 Conclusions
172
References
174
Visually Understanding Jam Resistant Communication 175
D. Schweitzer, L. Baird, and W. Bahn
1 Introduction
175
2 Related Work
176
2.1 BBC and Concurrent Codes
177
2.2 BBC Implementations
178
3 Technical Approach
179
3.1 An Audio Solution
179
3.2 A Visual Representation
180
4 Future Work
184
5 Conclusions
185
References
186
Visualization of Host Behavior for Network Security 187
F. Mansman, L. Meier, and D.A. Keim
1 Introduction
187
2 Related Work
189
2.1 Analysis of Application Ports
190
2.2 Graph-Based Approaches for Network Monitoring
190
2.3 Towards Visual Analytics for Network Security
191
2.4 Summary
191
3 Technical Approach
191
3.1 Layout Details
193
3.2 Implementation
194
3.3 User Interaction
194
3.4 Abstraction and Integration of the Behavior Graph in HNMap
196
3.5 Application and Evaluation
197
4 Future Work
200
5 Conclusions
200
References
201
Putting Security in Context: Visual Correlation of Network Activity with Real-World Information 203
W.A. Pike, C. Scherrer, and S. Zabriskie
1 Introduction
203
2 Related Work
204
2.1 The Importance of Maintaining Context
204
2.2 Visualizing Packets and Flows
205
2.3 Visualizing Correlated Activity
206
3 Technical Approach
206
3.1 "I Just Want to Know Where to Focus My Time"
207
3.2 "We Need to Organize Our Hay into Smaller Piles"
208
3.3 Behavior Modeling
209
3.4 Building Context
213
3.5 Visualizing Behavior in Context
214
4 Future Work
217
5 Conclusions
218
References
219
An Interactive Attack Graph Cascade and Reachability Display 221
L. Williams, R. Lippmann, and K. Ingols
1 Introduction
221
2 Related Work
222
2.1 Limitations of Existing Approaches
222
2.2 NetSPA System
223
3 Technical Approach
224
3.1 Design Goals
225
3.2 Initial System Design
225
3.3 Example Network Results
227
3.4 Field Trial Results
230
4 Future Work
232
5 Conclusions
234
References
235
Intelligent Classification and Visualization of Network Scans 237
C. Muelder, L. Chen, R. Thomason, K.-L. Ma, and T. Bartoletti
1 Introduction
237
2 Related Work
239
3 Technical Approach
240
3.1 Scan Data and Representation
241
3.2 An Intelligent Method
242
3.3 Visualization Integration
246
3.4 A Case Study
249
4 Future Work
250
5 Conclusions
251
References
252
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope 255
B. Irwin and J.-P. van Riel
1 Introduction
255
1.1 The Merits and Difficulties of Scan Detection
256
2 Related Work
257
2.1 Intrusion Detection and the False Positive Problem
257
2.2 Network Telescopes
257
2.3 Classifications of Network Scan Activity
258
2.4 Algorithmic Approaches to Scan Detection
258
2.5 Network Security Visualisation
259
3 InetVis Network Traffic Visualisation
259
3.1 Key Features and Enhancements
260
4 Investigative Methodology
261
4.1 Network Telescope Traffic Capture
262
4.2 Scan Detection Configuration and Processing
262
4.3 Graphical Exploration and Investigation with InetVis
264
5 Results and Analysis
264
5.1 Address Scans and the Distribution of Unique Addresses
265
5.2 Scans Discovered and Characterised with InetVis
266
6 Future Work
270
7 Conclusion
271
References
271