Skip to main content

RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support

  • Conference paper
Critical Information Infrastructure Security (CRITIS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5508))

Abstract

The pervasive aspect of the Internet increases the demand for tools that support both monitoring and auditing of security aspects in computer networks. Ideally, these tools should provide a clear and objective presentation of security data in such a way as to let network administrators detect or even predict network security breaches. However, most of these data are still presented only in raw text form, or through inadequate data presentation techniques. Our work tackles this problem by designing and developing a powerful tool that aims at integrating several information visualization techniques in an effective and expressive visualization. We have tested our tool in the context of network security, presenting two case studies that demonstrate important features such as scalability and detection of critical network security issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandalski, S.: fe3d, http://projects.icapsid.net/fe3d/

  2. Galstad, E.: Nagios, http://www.nagios.org/

  3. Priddy, B.: Cheops-ng, http://cheops-ng.sourceforge.net/

  4. Robertson, G.G., Mackinlay, J.D., Card, S.K.: Cone trees: animated 3d visualizations of hierarchical information. In: Proceedings of the 1991 SIGCHI Conference on Human factors in computing systems, pp. 189–194. ACM Press, New York (1991)

    Google Scholar 

  5. Chalmers, M.: Tutorial: Design and perception in information visualisation. In: 25th International Conference on Very Large Data Bases (1999)

    Google Scholar 

  6. Eades, P.: Drawing free trees. Bulletin of the Institute for Combinatorics and its Applications 5, 10–36 (1992)

    MathSciNet  MATH  Google Scholar 

  7. Teoh, S.T., Ma, K.L., Wu, S.F., Jankun-Kelly, T.J.: Detecting flaws and intruders with visual data analysis. IEEE Comput. Graph. Appl. 24(5), 27–35 (2004)

    Article  Google Scholar 

  8. Muelder, C., Ma, K.L., Bartoletti, T.: Interactive visualization for network and port scan detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 265–283. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Conti, G.: Security Data Visualization – Graphical Techniques for Network Analysis, 1st edn. No Starch Press (2007)

    Google Scholar 

  10. Fyodor: Nmap, http://www.insecure.org/nmap/

  11. NIST: National Vulnerability Database – NVD, http://nvd.nist.gov/

  12. Lutz, M.: Programming Python, 3rd edn. O’Reilly Media, Sebastopol (2006)

    MATH  Google Scholar 

  13. Card, S., Mackinlay, J., Shneiderman, B. (eds.): Readings in Information Visualization - Using Vision to Think. Morgan Kaufmann Publishers, Inc., San Francisco (1999)

    Google Scholar 

  14. Bertin, J.: Semiology of Graphics: Diagrams, Networks, Maps. University of Wisconsin Press (1983)

    Google Scholar 

  15. Mackinlay, J.: Automating the design of graphical presentations of relational information. ACM Transaction on Graphics 5(2), 110–141 (1986)

    Article  Google Scholar 

  16. Frøkjær, E., Hertzum, M., Hornbæk, K.: Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? In: CHI 2000: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 345–352. ACM, New York (2000)

    Google Scholar 

  17. Kosara, R., Healey, C.G., Interrante, V., Laidlaw, D.H., Ware, C.: User studies: Why, how, and when? Computer Graphics and Applications 623(4), 20–25 (2003)

    Article  Google Scholar 

  18. Yee, K.P., Fisher, D., Dhamija, R., Hearst, M.A.: Animated exploration of dynamic graphs with radial layout. In: INFOVIS, pp. 43–50 (2001)

    Google Scholar 

  19. Mickinlay, J.D., Robertson, G.G., Card, S.K.: The perspective wall: detail and context smoothly integrated. In: Carroll, J.M., Tanner, P.P. (eds.) Proceedings of the 1987 SIGCHI Conference on Human Factors in Computing Systems and Graphics Interface, pp. 173–179. ACM Press, New York (1987)

    Google Scholar 

  20. Furnas, G.W.: The FISHEYE view: A new look at structured files. Technical Report #81-11221-9, Bell Labs, Murray Hill, New Jersey 07974, U.S.A. (December 1981)

    Google Scholar 

  21. Becker, R., Cleveland, W.: Brushing scatterplots. Technometrics 29(2), 127–142 (1987)

    Article  MathSciNet  Google Scholar 

  22. Plaisant, C.: The challenge of information visualization evaluation. In: Proceedings of the working conference on Advanced Visual Interfaces (AVI 2004), pp. 109–116. ACM Press, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Medeiros, J.P.S., dos Santos, S.R. (2009). RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support. In: Setola, R., Geretshuber, S. (eds) Critical Information Infrastructure Security. CRITIS 2008. Lecture Notes in Computer Science, vol 5508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03552-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03552-4_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03551-7

  • Online ISBN: 978-3-642-03552-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics