skip to main content
10.1145/1029208acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
ACM2004 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS04: 11th ACM Conference on Computer and Communications Security 2004 Washington DC USA 29 October 2004
ISBN:
978-1-58113-974-7
Published:
29 October 2004
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 08 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

This volume contains the papers presented at the CCS Workshop on Visualization and Data Mining for Computer Security. VizSec/DMSec 2004 was held on October 29th, 2004 at George Mason University in conjunction with the Eleventh ACM Conference on Computer and Communications Security.

Information about security on large and complex computer networks is high volume, heterogeneous, distributed, and dynamic over time. This workshop brought together researchers from two complementary approaches for processing high-dimensional data into knowledge: visualization and data mining. Visualization represents high-dimension security data in 2D/3D graphics and animations intended to facilitate quick inferences for situational awareness and focusing of attention on potential security events. Data mining focuses on algorithms to accurately detect patterns in high-dimension security data representing unauthorized system access or computer network attacks. The workshop received 36 paper submissions, from which the 13 long and 6 short papers that appear here were selected by the program committee.

Skip Table Of Content Section
SESSION: DMSEC session
Article
User re-authentication via mouse movements

We present an approach to user re-authentication based on the data collected from the computer's mouse device. Our underlying hypothesis is that one can successfully model user behavior on the basis of user-invoked mouse movements. Our implemented ...

Article
HMM profiles for network traffic classification

We present techniques for building HMM profiles for network applications using only the packet-level information that remains intact and observable after encryption, namely, packet size and arrival time. Using less information than previously thought ...

Article
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences

Most of the prevalent anomaly detection systems use some training data to build models. These models are then utilized to capture any deviations resulting from possible intrusions. The efficacy of such systems is highly dependent upon a training data ...

SESSION: VizSEC link analysis session
Article
VisFlowConnect: netflow visualizations of link relationships for security situational awareness

We present a visualization design to enhance the ability of an administrator to detect and investigate anomalous traffic between a local network and external domains. Central to the design is a parallel axes view which displays NetFlow records as links ...

Article
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP

The security of Internet routing is a major concern because attacks and errors can result in data packets not reaching their intended destination and/or falling into the wrong hands. A key step in improving routing security is to analyze and understand ...

Article
Passive visual fingerprinting of network attack tools

This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attackers as well as the identifiable characteristics of the tools themselves. ...

Article
Home-centric visualization of network traffic for security administration

Today's system administrators, burdened by rapidly increasing network activity, must quickly perceive the security state of their networks, but they often have only text-based tools to work with. These tools often provide no overview to help users grasp ...

SESSION: VizSEC state analysis session
Article
NVisionIP: netflow visualizations of system state for security situational awareness

The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble keeping on top of the current state of their networks. In this paper, we ...

Article
PortVis: a tool for port-based detection of security events

Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coarsely detailed because of security concerns or other limitations. How can ...

SESSION: VizSEC innovative visualizations session
Article
Visualizing windows executable viruses using self-organizing maps

This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer viruses. In this paper, we address the fact that each viruses have its own ...

Article
CyberSeer: 3D audio-visual immersion for network security and management

Large complex networks have become an inseparable part of modern society. However, very little has been done to develop tools to manage and ensure the security of such networks. Network operators continue to slave over endless daily logs and alerts in a ...

Article
Combining a bayesian classifier with visualisation: understanding the IDS

Despite several years of intensive study, intrusion detection systems still suffer from two key deficiencies: Low detection rates and a high rate of false alarms.

To counteract these drawbacks an interactive detection system based on simple Bayesian ...

Article
Managing attack graph complexity through visual hierarchical aggregation

We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation collapses non-overlapping subgraphs of the attack graph to single graph ...

SESSION: VizSEC short papers session
Article
Scatter (and other) plots for visualizing user profiling data and network traffic

The scatterplot continues to be one of the most useful tools for visualizing numeric data, however what we typically encounter in Computer Security is categorical and/or textual in nature, and how to convert it into a form where scatterplots apply is ...

Article
Scalable visualization of propagating internet phenomena

The Internet has recently been impacted by a number of large distributed attacks that achieve exponential growth through self-propagation. Some of these attacks have exploited vulnerabilities for which advisories had been issued and for which patches ...

Article
Email archive analysis through graphical visualization

The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spam and virus filtering. Current email analysis in standard client ...

Article
NVisionCC: a visualization framework for high performance cluster security

Large high performance clusters are gaining popularity as a means of harnessing vast computing resources at low cost using commodity components. Cluster system administrators face difficulty from two related problems. First, while several cluster ...

Article
Statistical profiling and visualization for detection of malicious insider attacks on computer networks

The massive volume of intrusion detection system (IDS) alarms generated on large networks, and the resulting need for labor-intensive security analysis of the text-based IDS alarm logs, has recently brought into question the cost-effectiveness of IDSs. ...

Article
SnortView: visualization system of snort logs

False detection is a major issue in deploying and maintaining Network-based Intrusion Detection Systems (NIDS). Traditionally, it is recommended to customize its signature database (DB) to reduce false detections. However, it requires quite deep ...

Contributors
  • Northeastern University
  • Florida Institute of Technology
  • Lincoln Laboratory
  1. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security

      Recommendations