Export Citations
Cyber security plays a critical role in the health and well being of nations around the world. Cyber-warfare, cyber-crime, and cyber-terrorism threaten the economic and political stability of society. Botnets and automated attacks disrupt services, threaten national infrastructures, and fuel international crime.
As VizSec continues into its 11th annual meeting, the importance of cyber security continues to rise. High profile cyber security incidents and data breaches highlight the importance of security for organizations both large and small. The need for better tools in cyber security is now widely recognized and supported.
Important research problems often lie at the intersection of disparate domains. The focus of VizSec is to explore effective, scalable visual interfaces for security domains where visualization provides a distinct benefit. This includes computer forensics, reverse engineering, privacy, compliance management, firewall management, wireless security, secure coding, and other areas of network security. Human time and attention are precious resources, and these tools must use them effectively.
This year's program explores the use of visualization techniques to support collaborative security analysis, to aid in the reverse engineering of malware, to facilitate the analysis of system-level information, as well as techniques and challenges for evaluating security visualizations.
Proceeding Downloads
OCEANS: online collaborative explorative analysis on network security
Visualization and interactive analysis can help network administrators and security analysts analyze the network flow and log data. The complexity of such an analysis requires a combination of knowledge and experience from more domain experts to solve ...
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
- Markus Wagner,
- Wolfgang Aigner,
- Alexander Rind,
- Hermann Dornhackl,
- Konstantin Kadletz,
- Robert Luh,
- Paul Tavolato
Behavior-based analysis of emerging malware families involves finding suspicious patterns in large collections of execution traces. This activity cannot be automated for previously unknown malware families and thus malware analysts would benefit greatly ...
Multiple queries with conditional attributes (QCATs) for anomaly detection and visualization
This paper describes a visual analytics method for visualizing the effects of multiple anomaly detection models, exploring the complex model space of a specific type of detection method, namely Query with Conditional Attributes (QCAT), and facilitating ...
DAVAST: data-centric system level activity visualization
Host-based intrusion detection systems need to be complemented by analysis tools that help understand if malware or attackers have indeed intruded, what they have done, and what the consequences are. We present a tool that visualizes system activities ...
7 key challenges for visualization in cyber network defense
What does it take to be a successful visualization in cyber security? This question has been explored for some time, resulting in many potential solutions being developed and offered to the cyber security community. However, when one reflects upon the ...
Visual filter: graphical exploration of network security log files
Network log files often need to be investigated manually for suspicious activity. The huge amount of log lines complicates maintaining an overview, navigation and quick pattern identification. We propose a system that uses an interactive visualization, ...
Visualization evaluation for cyber security: trends and future directions
- Diane Staheli,
- Tamara Yu,
- R. Jordan Crouser,
- Suresh Damodaran,
- Kevin Nam,
- David O'Gwynn,
- Sean McKenna,
- Lane Harrison
The Visualization for Cyber Security research community (VizSec) addresses longstanding challenges in cyber security by adapting and evaluating information visualization techniques with application to the cyber security domain. This research effort has ...
CORGI: combination, organization and reconstruction through graphical interactions
In this article, we present CORGI, a security-oriented log visualization tool that allows security experts to visually explore and link numerous types of log files through relevant representations and global filtering. The analyst can mark values as ...
NStreamAware: real-time visual analytics for data streams to enhance situational awareness
The analysis of data streams is important in many security-related domains to gain situational awareness. To provide monitoring and visual analysis of such data streams, we propose a system, called NStreamAware, that uses modern distributed processing ...
SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis
Recently, the number of observed malware samples has rapidly increased, expanding the workload for malware analysts. Most of these samples are not truly unique, but are related through shared attributes. Identifying these attributes can enable analysts ...
IMap: visualizing network activity over internet maps
- J. Joseph Fowler,
- Thienne Johnson,
- Paolo Simonetto,
- Michael Schneider,
- Carlos Acedo,
- Stephen Kobourov,
- Loukas Lazos
We propose a novel visualization, IMap, which enables the detection of security threats by visualizing a large volume of dynamic network data. In IMap, the Internet topology at the Autonomous System (AS) level is represented by a canonical map (which ...
Detecting malware samples with similar image sets
This paper proposes a method for identifying and visualizing similarity relationships between malware samples based on their embedded graphical assets (such as desktop icons and button skins). We argue that analyzing such relationships has practical ...
Index Terms
- Proceedings of the Eleventh Workshop on Visualization for Cyber Security
Recommendations
Visualization evaluation for cyber security: trends and future directions
VizSec '14: Proceedings of the Eleventh Workshop on Visualization for Cyber SecurityThe Visualization for Cyber Security research community (VizSec) addresses longstanding challenges in cyber security by adapting and evaluating information visualization techniques with application to the cyber security domain. This research effort has ...
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
VizSec '14 | 43 | 12 | 28% |
VizSec '13 | 30 | 9 | 30% |
VizSec '11 | 11 | 6 | 55% |
VizSec '10 | 27 | 12 | 44% |
Overall | 111 | 39 | 35% |