A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and atta...
Main Author: | |
---|---|
Format: | Others |
Published: |
Digital Archive @ GSU
2006
|
Subjects: | |
Online Access: | http://digitalarchive.gsu.edu/cs_theses/17 http://digitalarchive.gsu.edu/cgi/viewcontent.cgi?article=1016&context=cs_theses |
id |
ndltd-GEORGIA-oai-digitalarchive.gsu.edu-cs_theses-1016 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-GEORGIA-oai-digitalarchive.gsu.edu-cs_theses-10162013-04-23T03:19:20Z A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques Kasemsri, Rawiroj Robert Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without network security visualization, reading through log files or other textual sources is an endless and aggravating task for network security analysts. Visualization provides a method of displaying large volume of information in a relatively small space. It also makes patterns easier to detect, recognize, and analyze. This can help security experts to detect problems that may otherwise be missed in reading text based log files. Network security visualization has become an active research field in the past six years and a large number of visualization techniques have been proposed. A comprehensive analysis of the existing techniques is needed to help network security designers make informed decisions about the appropriate visualization techniques under various circumstances. Moreover, a taxonomy of the existing visualization techniques is needed to classify the existing network security visualization techniques and present a high level overview of the field. In this thesis, the author surveyed the field of network security visualization. Specifically, the author analyzed the network security visualization techniques from the perspective of data model, visual primitives, security analysis tasks, user interaction, and other design issues. Various statistics were generated from the literatures. Based on this analysis, the author has attempted to generate useful guidelines and principles for designing effective network security visualization techniques. The author also proposed a taxonomy for the security visualization techniques. To the author’s knowledge, this is the first attempt to generate a taxonomy for network security visualization. Finally, the author evaluated the existing network security visualization techniques and discussed their characteristics and limitations. For future research, the author also discussed some open research problems in this field. This research is a step towards a thorough analysis of the problem space and the solution space in network security visualization. 2006-01-12 text application/pdf http://digitalarchive.gsu.edu/cs_theses/17 http://digitalarchive.gsu.edu/cgi/viewcontent.cgi?article=1016&context=cs_theses Computer Science Theses Digital Archive @ GSU Anomalies Taxonomy Security visualization Network security Security information Computer Sciences |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Anomalies Taxonomy Security visualization Network security Security information Computer Sciences |
spellingShingle |
Anomalies Taxonomy Security visualization Network security Security information Computer Sciences Kasemsri, Rawiroj Robert A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques |
description |
Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without network security visualization, reading through log files or other textual sources is an endless and aggravating task for network security analysts. Visualization provides a method of displaying large volume of information in a relatively small space. It also makes patterns easier to detect, recognize, and analyze. This can help security experts to detect problems that may otherwise be missed in reading text based log files. Network security visualization has become an active research field in the past six years and a large number of visualization techniques have been proposed. A comprehensive analysis of the existing techniques is needed to help network security designers make informed decisions about the appropriate visualization techniques under various circumstances. Moreover, a taxonomy of the existing visualization techniques is needed to classify the existing network security visualization techniques and present a high level overview of the field. In this thesis, the author surveyed the field of network security visualization. Specifically, the author analyzed the network security visualization techniques from the perspective of data model, visual primitives, security analysis tasks, user interaction, and other design issues. Various statistics were generated from the literatures. Based on this analysis, the author has attempted to generate useful guidelines and principles for designing effective network security visualization techniques. The author also proposed a taxonomy for the security visualization techniques. To the author’s knowledge, this is the first attempt to generate a taxonomy for network security visualization. Finally, the author evaluated the existing network security visualization techniques and discussed their characteristics and limitations. For future research, the author also discussed some open research problems in this field. This research is a step towards a thorough analysis of the problem space and the solution space in network security visualization. |
author |
Kasemsri, Rawiroj Robert |
author_facet |
Kasemsri, Rawiroj Robert |
author_sort |
Kasemsri, Rawiroj Robert |
title |
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques |
title_short |
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques |
title_full |
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques |
title_fullStr |
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques |
title_full_unstemmed |
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques |
title_sort |
survey, taxonomy, and analysis of network security visualization techniques |
publisher |
Digital Archive @ GSU |
publishDate |
2006 |
url |
http://digitalarchive.gsu.edu/cs_theses/17 http://digitalarchive.gsu.edu/cgi/viewcontent.cgi?article=1016&context=cs_theses |
work_keys_str_mv |
AT kasemsrirawirojrobert asurveytaxonomyandanalysisofnetworksecurityvisualizationtechniques AT kasemsrirawirojrobert surveytaxonomyandanalysisofnetworksecurityvisualizationtechniques |
_version_ |
1716583966705713152 |