Abstract
The challenges of CSA discussed in previous chapters call for ways to provide assistance to analysts and decision-makers. In many fields, analyses of complex systems and activities benefit from visualization of data and analytical products. Analysts use images in order to engage their visual perception in identifying features in the data, and to apply the analysts’ domain knowledge. One would expect the same to be true in the practice of cyber analysts as they try to form situational awareness of complex networks. Earlier, the Cognition and Technology chapter introduced the topic of visualization: its criticality to the users, e.g., cyber analysts, as well as its pitfalls and limitations. Now, this chapter takes a close look at visualization for Cyber Situational Awareness. We begin with a basic overview of scientific and information visualization, and of recent visualization systems for cyber situation awareness. Then, we outline a set of requirements, derived largely from discussions with expert cyber analysts, for a candidate visualization system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bertin, J (1967) Sémiologie Graphiques: Les diagrammes, les réseaux, les cartes. Gauthier-Villars, Paris
Bradshaw, J M, Carvalho, M, Bunch, L et al (2012) Sol: An agent-based framework for cyber situation awareness. Künstliche Intelligenz 26(2):127–140
Chernoff, H (1973) The use of faces to represent points in \( k \)-dimensional space graphically. Journal of the American Statistical Association 68(342):361–368
Cockburn, A, Karlson, A, and Bederson, B B (2008) A review of overview+detail, zooming, and focus+context interfaces. ACM Computing Surveys 41(1):Article 2
Dang, K T and Dang, T T (2013) A survey on security visualization techniques for web information systems. International Journal of Web Information Systems 9(1):6–31
DeFanti, B H and Brown, T A (1987) Visualization in scientific computing. Computer Graphics 21(6)
Goodall, J and Sowul, M (2009) VIAssist: Visual analytics for cyber defense. Paper presented at the IEEE Conference on Technologies for Homeland Security (HST ’09), Boston, MA
Heyes, R (2014) RGraph: HTML5 charts library. http://www.rgraph.net. Accessed 02 May 2014
Johnson, C R (2004) Top scientific visualization research problems. IEEE Computer Graphics & Applications 24(4):13–17
Johnson, C R, Moorehead, R, Munzner, T et al (eds) (2006) NIH/NSF Visualization Research Challenges. IEEE Press
Kan, Z, Hu, C, Wang, Z et al (2010) NetVis: A network security management visualization tool based on treemap. Paper presented at the 2nd International Conference on Advanced Computer Control (ICACC 2010), Shenyang, China
Lakkaraju, K, Yurcik, W and Lee, A J (2004) NVisionIP: Netflow visualizations of system state for security situational awareness. Paper presented at the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC ’04), Washington, DC
Mansmann, F, Fisher, F, Keim, D A et al (2009) Visual support for analyzing network traffic and intrusion detection events using treemap and graph representations. Paper presented at the Symposium on Computer-Human Interaction for Management of Information (CHIMIT 2009), Baltimore, MD
McPherson, J, Ma, K, Krystosk, P et al (2004) PortVis: A tool for port-based detection of security events. Paper presented at the Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC ’04), Washington, DC
Minarik, P and Dymacek, T (2008) NetFlow data visualization based on graphs. In: Visualization for Computer Security, Springer, pp 144–151
Phan, D, Gerth, J, Lee, M, Paepcke et al (2007) Visual analysis of network flow data with timelines and event plots. Paper presented in the Proceedings of the 4th International Workshop on Visualization for Cyber Security (VizSec 2007), Sacramento, CA
Roberts, J C, Faithfull, W J and Williams, F C B (2012) SitaVis—Interactive situation awareness visualization of large datasets. Paper presented in the Proceedings 2012 Conference on Visual Analytics Science and Technology (VAST 2012), Seattle, WA
Shiravi, H, Shiravi, A, and Ghorbani, A A (2012) A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics 18(8):1313–1329
Thomas, J J and Cook, K A (2005) Illuminating the path: The research and development agenda for visual analytics. National Visualization and Analytics Center
Tricaud, S, Nance, K, and Saade, P (2011) Visualizing network activity using parallel coordinates. Paper presented in the Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS 2011), Poipu, HI
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Healey, C.G., Hao, L., Hutchinson, S.E. (2014). Visualizations and Analysts. In: Kott, A., Wang, C., Erbacher, R. (eds) Cyber Defense and Situational Awareness. Advances in Information Security, vol 62. Springer, Cham. https://doi.org/10.1007/978-3-319-11391-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-11391-3_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11390-6
Online ISBN: 978-3-319-11391-3
eBook Packages: Computer ScienceComputer Science (R0)