skip to main content
10.1145/2517957.2517959acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvizsecConference Proceedingsconference-collections
research-article

ELVIS: Extensible Log VISualization

Published: 02 October 2013 Publication History

Abstract

In this article, we propose ELVIS, a security-oriented log visualization tool that allows security experts to visually explore numerous types of log files through relevant representations. When a log file is loaded into ELVIS, a summary view is displayed. This view is the starting point for exploring the log. The analyst can then choose to explore certain fields or sets of fields from the dataset. To that end, ELVIS selects relevant representations according to the fields chosen by the analyst for display.

References

[1]
K. Abdullah and C. Lee. IDS RainStorm: Visualizing IDS Alarms Workshop on Visualization for Computer Security. pages 1--10.
[2]
A. D. Amico and K. Whitley. The Real Work of Computer Network Defense Analysts The Analysis Roles and Processes that Transform. pages 19--37.
[3]
J. Bertin. Semiology of Graphics: Diagrams, Networks, Maps. University of Wisconsin Press.
[4]
M. Bostock, V. Ogievetsky, and J. Heer. D3: Data-Driven Documents. IEEE transactions on visualization and computer graphics, 17(12):2301--9, Dec. 2011.
[5]
S. G. Eick, M. C. Nelson, and J. D. Schmidt. Graphical analysis of computer log files. Commun. ACM, 37(12):50--56, Dec. 1994.
[6]
J. R. Goodall and W. G. Lutters. Preserving the Big Picture: Visual Network Traffic Analysis with TNV. pages 47--54.
[7]
C. Kintzel, J. Fuchs, and F. Mansmann. Monitoring Large IP Spaces with ClockView.
[8]
J. Mackinlay. Tableau Public: Helping Everyone Tell Stories with Data on the Web. Analysis, 2010.
[9]
J. Mackinlay, P. Hanrahan, and C. Stolte. Show me: automatic presentation for visual analysis. IEEE Transactions on Visualization and Computer Graphics, 13(6):1137--1144, 2007.
[10]
A. Oliner, A. Ganapathi, and W. Xu. Advances and challenges in log analysis. Communications of the ACM, 55(2):55--61, 2012.
[11]
J. Stearley, S. Corwell, and K. Lord. Bridging the gaps: joining information sources with splunk. In Proceedings of the 2010 workshop on Managing systems via log analysis and machine learning techniques, SLAML'10, pages 8--8, Berkeley, CA, USA, 2010. USENIX Association.
[12]
T. Taylor, S. Brooks, and M. John. NetBytes Viewer: An Entity-based Netflow Visualization Utility for Identifying Intrusive Behavior.
[13]
T. Taylor, D. Paterson, J. Glanfield, C. Gates, S. Brooks, and J. McHugh. FloVis: Flow Visualization System. 2009 Cybersecurity Applications Technology Conference for Homeland Security, pages 186--198, 2009.
[14]
The Honeynet Project. Forensic Challenge 10 - "Attack Visualization" | The Honeynet Project, http://www.honeynet.org/node/781.
[15]
The Miso Project. The Miso Project:: d3.chart, http://misoproject.com/d3-chart/.
[16]
S. Tricaud. Picviz: Finding a needle in a haystack. In Proceedings of the First UNSENIX Workshop on the Analysis of System Logs (WASL), 2008.
[17]
E. R. Tufte. Envisioning Information. Graphics Press, 4th printing edition, 1990.
[18]
F. B. Viégas, M. Wattenberg, F. V. Ham, J. Kriss, and M. Mckeon. Many Eyes: A Site for Visualization at Internet Scale. (August), 2007.
[19]
C. Wagner, A. Dulaunoy, S. A. Ses, and T. Engel. PeekKernelFlows: Peeking into IP flows. pages 0--5, 2010.
[20]
L. Wilkinson. The Grammar of Graphics. Springer, 1999.
[21]
G. Wills and L. Wilkinson. AutoVis: Automatic visualization. Information Visualization, 9(1):47--69, Dec. 2008.

Cited By

View all
  • (2024)Web Services Analysis and Threat Detection Through Score-Based Anomaly Detection System and Data Visualizations2024 Cyber Awareness and Research Symposium (CARS)10.1109/CARS61786.2024.10778698(1-8)Online publication date: 28-Oct-2024
  • (2021)An Efficient Analytical Approach to Visualize Text-Based Event Logs for Semiconductor EquipmentApplied Sciences10.3390/app1113594411:13(5944)Online publication date: 26-Jun-2021
  • (2021)KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a NotchInnovative Security Solutions for Information Technology and Communications10.1007/978-3-031-17510-7_1(1-17)Online publication date: 25-Nov-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
VizSec '13: Proceedings of the Tenth Workshop on Visualization for Cyber Security
October 2013
77 pages
ISBN:9781450321730
DOI:10.1145/2517957
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. forensics
  2. intrusion detection
  3. logs management
  4. visualization

Qualifiers

  • Research-article

Funding Sources

Conference

VizSec '13
VizSec '13: Visualization for Cyber Security
October 14, 2013
Georgia, Atlanta, USA

Acceptance Rates

VizSec '13 Paper Acceptance Rate 9 of 30 submissions, 30%;
Overall Acceptance Rate 39 of 111 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Web Services Analysis and Threat Detection Through Score-Based Anomaly Detection System and Data Visualizations2024 Cyber Awareness and Research Symposium (CARS)10.1109/CARS61786.2024.10778698(1-8)Online publication date: 28-Oct-2024
  • (2021)An Efficient Analytical Approach to Visualize Text-Based Event Logs for Semiconductor EquipmentApplied Sciences10.3390/app1113594411:13(5944)Online publication date: 26-Jun-2021
  • (2021)KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a NotchInnovative Security Solutions for Information Technology and Communications10.1007/978-3-031-17510-7_1(1-17)Online publication date: 25-Nov-2021
  • (2020)Exploratory Analysis of File System Metadata for Rapid Investigation of Security Incidents2020 IEEE Symposium on Visualization for Cyber Security (VizSec)10.1109/VizSec51108.2020.00008(11-20)Online publication date: Oct-2020
  • (2018)A Process Framework for Stakeholder-specific Visualization of Security MetricsProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3232855(1-10)Online publication date: 27-Aug-2018
  • (2018)Visual Analytics for Decomposing Temporal Event Series of Production Lines2018 22nd International Conference Information Visualisation (IV)10.1109/iV.2018.00051(251-259)Online publication date: Jul-2018
  • (2017)Personal visual analytics for android security risk lifelogProceedings of the 10th International Symposium on Visual Information Communication and Interaction10.1145/3105971.3105975(29-36)Online publication date: 14-Aug-2017
  • (2017)FLUKESProceedings of the International Conference on Future Networks and Distributed Systems10.1145/3102304.3102337(1-6)Online publication date: 19-Jul-2017
  • (2017)Toward a visualization-supported workflow for cyber alert management using threat models and human-centered design2017 IEEE Symposium on Visualization for Cyber Security (VizSec)10.1109/VIZSEC.2017.8062200(1-8)Online publication date: Oct-2017
  • (2017)Integrating visual analysis of network security and management of detection system configurations2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)10.1109/IDAACS.2017.8095240(1020-1025)Online publication date: Sep-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media