skip to main content
10.1145/2671491acmotherconferencesBook PagePublication PagesvizsecConference Proceedingsconference-collections
VizSec '14: Proceedings of the Eleventh Workshop on Visualization for Cyber Security
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
VizSec '14: Visualization for Cyber Security Paris France 10 November 2014
ISBN:
978-1-4503-2826-5
Published:
10 November 2014
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 08 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

Cyber security plays a critical role in the health and well being of nations around the world. Cyber-warfare, cyber-crime, and cyber-terrorism threaten the economic and political stability of society. Botnets and automated attacks disrupt services, threaten national infrastructures, and fuel international crime.

As VizSec continues into its 11th annual meeting, the importance of cyber security continues to rise. High profile cyber security incidents and data breaches highlight the importance of security for organizations both large and small. The need for better tools in cyber security is now widely recognized and supported.

Important research problems often lie at the intersection of disparate domains. The focus of VizSec is to explore effective, scalable visual interfaces for security domains where visualization provides a distinct benefit. This includes computer forensics, reverse engineering, privacy, compliance management, firewall management, wireless security, secure coding, and other areas of network security. Human time and attention are precious resources, and these tools must use them effectively.

This year's program explores the use of visualization techniques to support collaborative security analysis, to aid in the reverse engineering of malware, to facilitate the analysis of system-level information, as well as techniques and challenges for evaluating security visualizations.

Skip Table Of Content Section
research-article
OCEANS: online collaborative explorative analysis on network security

Visualization and interactive analysis can help network administrators and security analysts analyze the network flow and log data. The complexity of such an analysis requires a combination of knowledge and experience from more domain experts to solve ...

research-article
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis

Behavior-based analysis of emerging malware families involves finding suspicious patterns in large collections of execution traces. This activity cannot be automated for previously unknown malware families and thus malware analysts would benefit greatly ...

research-article
Multiple queries with conditional attributes (QCATs) for anomaly detection and visualization

This paper describes a visual analytics method for visualizing the effects of multiple anomaly detection models, exploring the complex model space of a specific type of detection method, namely Query with Conditional Attributes (QCAT), and facilitating ...

research-article
DAVAST: data-centric system level activity visualization

Host-based intrusion detection systems need to be complemented by analysis tools that help understand if malware or attackers have indeed intruded, what they have done, and what the consequences are. We present a tool that visualizes system activities ...

research-article
7 key challenges for visualization in cyber network defense

What does it take to be a successful visualization in cyber security? This question has been explored for some time, resulting in many potential solutions being developed and offered to the cyber security community. However, when one reflects upon the ...

research-article
Visual filter: graphical exploration of network security log files

Network log files often need to be investigated manually for suspicious activity. The huge amount of log lines complicates maintaining an overview, navigation and quick pattern identification. We propose a system that uses an interactive visualization, ...

research-article
Visualization evaluation for cyber security: trends and future directions

The Visualization for Cyber Security research community (VizSec) addresses longstanding challenges in cyber security by adapting and evaluating information visualization techniques with application to the cyber security domain. This research effort has ...

research-article
CORGI: combination, organization and reconstruction through graphical interactions

In this article, we present CORGI, a security-oriented log visualization tool that allows security experts to visually explore and link numerous types of log files through relevant representations and global filtering. The analyst can mark values as ...

research-article
NStreamAware: real-time visual analytics for data streams to enhance situational awareness

The analysis of data streams is important in many security-related domains to gain situational awareness. To provide monitoring and visual analysis of such data streams, we propose a system, called NStreamAware, that uses modern distributed processing ...

research-article
SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis

Recently, the number of observed malware samples has rapidly increased, expanding the workload for malware analysts. Most of these samples are not truly unique, but are related through shared attributes. Identifying these attributes can enable analysts ...

research-article
IMap: visualizing network activity over internet maps

We propose a novel visualization, IMap, which enables the detection of security threats by visualizing a large volume of dynamic network data. In IMap, the Internet topology at the Autonomous System (AS) level is represented by a canonical map (which ...

research-article
Detecting malware samples with similar image sets

This paper proposes a method for identifying and visualizing similarity relationships between malware samples based on their embedded graphical assets (such as desktop icons and button skins). We argue that analyzing such relationships has practical ...

Contributors
  • United States Department of Defense
  • University of San Francisco
  • Worcester Polytechnic Institute
  • University of Konstanz
  • CentraleSupélec
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

VizSec '14 Paper Acceptance Rate 12 of 43 submissions, 28%;
Overall Acceptance Rate 39 of 111 submissions, 35%
YearSubmittedAcceptedRate
VizSec '14431228%
VizSec '1330930%
VizSec '1111655%
VizSec '10271244%
Overall1113935%