Abstract
The pervasive aspect of the Internet increases the demand for tools that support both monitoring and auditing of security aspects in computer networks. Ideally, these tools should provide a clear and objective presentation of security data in such a way as to let network administrators detect or even predict network security breaches. However, most of these data are still presented only in raw text form, or through inadequate data presentation techniques. Our work tackles this problem by designing and developing a powerful tool that aims at integrating several information visualization techniques in an effective and expressive visualization. We have tested our tool in the context of network security, presenting two case studies that demonstrate important features such as scalability and detection of critical network security issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sandalski, S.: fe3d, http://projects.icapsid.net/fe3d/
Galstad, E.: Nagios, http://www.nagios.org/
Priddy, B.: Cheops-ng, http://cheops-ng.sourceforge.net/
Robertson, G.G., Mackinlay, J.D., Card, S.K.: Cone trees: animated 3d visualizations of hierarchical information. In: Proceedings of the 1991 SIGCHI Conference on Human factors in computing systems, pp. 189–194. ACM Press, New York (1991)
Chalmers, M.: Tutorial: Design and perception in information visualisation. In: 25th International Conference on Very Large Data Bases (1999)
Eades, P.: Drawing free trees. Bulletin of the Institute for Combinatorics and its Applications 5, 10–36 (1992)
Teoh, S.T., Ma, K.L., Wu, S.F., Jankun-Kelly, T.J.: Detecting flaws and intruders with visual data analysis. IEEE Comput. Graph. Appl. 24(5), 27–35 (2004)
Muelder, C., Ma, K.L., Bartoletti, T.: Interactive visualization for network and port scan detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 265–283. Springer, Heidelberg (2006)
Conti, G.: Security Data Visualization – Graphical Techniques for Network Analysis, 1st edn. No Starch Press (2007)
Fyodor: Nmap, http://www.insecure.org/nmap/
NIST: National Vulnerability Database – NVD, http://nvd.nist.gov/
Lutz, M.: Programming Python, 3rd edn. O’Reilly Media, Sebastopol (2006)
Card, S., Mackinlay, J., Shneiderman, B. (eds.): Readings in Information Visualization - Using Vision to Think. Morgan Kaufmann Publishers, Inc., San Francisco (1999)
Bertin, J.: Semiology of Graphics: Diagrams, Networks, Maps. University of Wisconsin Press (1983)
Mackinlay, J.: Automating the design of graphical presentations of relational information. ACM Transaction on Graphics 5(2), 110–141 (1986)
Frøkjær, E., Hertzum, M., Hornbæk, K.: Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? In: CHI 2000: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 345–352. ACM, New York (2000)
Kosara, R., Healey, C.G., Interrante, V., Laidlaw, D.H., Ware, C.: User studies: Why, how, and when? Computer Graphics and Applications 623(4), 20–25 (2003)
Yee, K.P., Fisher, D., Dhamija, R., Hearst, M.A.: Animated exploration of dynamic graphs with radial layout. In: INFOVIS, pp. 43–50 (2001)
Mickinlay, J.D., Robertson, G.G., Card, S.K.: The perspective wall: detail and context smoothly integrated. In: Carroll, J.M., Tanner, P.P. (eds.) Proceedings of the 1987 SIGCHI Conference on Human Factors in Computing Systems and Graphics Interface, pp. 173–179. ACM Press, New York (1987)
Furnas, G.W.: The FISHEYE view: A new look at structured files. Technical Report #81-11221-9, Bell Labs, Murray Hill, New Jersey 07974, U.S.A. (December 1981)
Becker, R., Cleveland, W.: Brushing scatterplots. Technometrics 29(2), 127–142 (1987)
Plaisant, C.: The challenge of information visualization evaluation. In: Proceedings of the working conference on Advanced Visual Interfaces (AVI 2004), pp. 109–116. ACM Press, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Medeiros, J.P.S., dos Santos, S.R. (2009). RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support. In: Setola, R., Geretshuber, S. (eds) Critical Information Infrastructure Security. CRITIS 2008. Lecture Notes in Computer Science, vol 5508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03552-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-03552-4_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03551-7
Online ISBN: 978-3-642-03552-4
eBook Packages: Computer ScienceComputer Science (R0)