A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques

Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and atta...

Full description

Bibliographic Details
Main Author: Kasemsri, Rawiroj Robert
Format: Others
Published: Digital Archive @ GSU 2006
Subjects:
Online Access:http://digitalarchive.gsu.edu/cs_theses/17
http://digitalarchive.gsu.edu/cgi/viewcontent.cgi?article=1016&context=cs_theses
id ndltd-GEORGIA-oai-digitalarchive.gsu.edu-cs_theses-1016
record_format oai_dc
spelling ndltd-GEORGIA-oai-digitalarchive.gsu.edu-cs_theses-10162013-04-23T03:19:20Z A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques Kasemsri, Rawiroj Robert Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without network security visualization, reading through log files or other textual sources is an endless and aggravating task for network security analysts. Visualization provides a method of displaying large volume of information in a relatively small space. It also makes patterns easier to detect, recognize, and analyze. This can help security experts to detect problems that may otherwise be missed in reading text based log files. Network security visualization has become an active research field in the past six years and a large number of visualization techniques have been proposed. A comprehensive analysis of the existing techniques is needed to help network security designers make informed decisions about the appropriate visualization techniques under various circumstances. Moreover, a taxonomy of the existing visualization techniques is needed to classify the existing network security visualization techniques and present a high level overview of the field. In this thesis, the author surveyed the field of network security visualization. Specifically, the author analyzed the network security visualization techniques from the perspective of data model, visual primitives, security analysis tasks, user interaction, and other design issues. Various statistics were generated from the literatures. Based on this analysis, the author has attempted to generate useful guidelines and principles for designing effective network security visualization techniques. The author also proposed a taxonomy for the security visualization techniques. To the author’s knowledge, this is the first attempt to generate a taxonomy for network security visualization. Finally, the author evaluated the existing network security visualization techniques and discussed their characteristics and limitations. For future research, the author also discussed some open research problems in this field. This research is a step towards a thorough analysis of the problem space and the solution space in network security visualization. 2006-01-12 text application/pdf http://digitalarchive.gsu.edu/cs_theses/17 http://digitalarchive.gsu.edu/cgi/viewcontent.cgi?article=1016&context=cs_theses Computer Science Theses Digital Archive @ GSU Anomalies Taxonomy Security visualization Network security Security information Computer Sciences
collection NDLTD
format Others
sources NDLTD
topic Anomalies
Taxonomy
Security visualization
Network security
Security information
Computer Sciences
spellingShingle Anomalies
Taxonomy
Security visualization
Network security
Security information
Computer Sciences
Kasemsri, Rawiroj Robert
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
description Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without network security visualization, reading through log files or other textual sources is an endless and aggravating task for network security analysts. Visualization provides a method of displaying large volume of information in a relatively small space. It also makes patterns easier to detect, recognize, and analyze. This can help security experts to detect problems that may otherwise be missed in reading text based log files. Network security visualization has become an active research field in the past six years and a large number of visualization techniques have been proposed. A comprehensive analysis of the existing techniques is needed to help network security designers make informed decisions about the appropriate visualization techniques under various circumstances. Moreover, a taxonomy of the existing visualization techniques is needed to classify the existing network security visualization techniques and present a high level overview of the field. In this thesis, the author surveyed the field of network security visualization. Specifically, the author analyzed the network security visualization techniques from the perspective of data model, visual primitives, security analysis tasks, user interaction, and other design issues. Various statistics were generated from the literatures. Based on this analysis, the author has attempted to generate useful guidelines and principles for designing effective network security visualization techniques. The author also proposed a taxonomy for the security visualization techniques. To the author’s knowledge, this is the first attempt to generate a taxonomy for network security visualization. Finally, the author evaluated the existing network security visualization techniques and discussed their characteristics and limitations. For future research, the author also discussed some open research problems in this field. This research is a step towards a thorough analysis of the problem space and the solution space in network security visualization.
author Kasemsri, Rawiroj Robert
author_facet Kasemsri, Rawiroj Robert
author_sort Kasemsri, Rawiroj Robert
title A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
title_short A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
title_full A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
title_fullStr A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
title_full_unstemmed A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
title_sort survey, taxonomy, and analysis of network security visualization techniques
publisher Digital Archive @ GSU
publishDate 2006
url http://digitalarchive.gsu.edu/cs_theses/17
http://digitalarchive.gsu.edu/cgi/viewcontent.cgi?article=1016&context=cs_theses
work_keys_str_mv AT kasemsrirawirojrobert asurveytaxonomyandanalysisofnetworksecurityvisualizationtechniques
AT kasemsrirawirojrobert surveytaxonomyandanalysisofnetworksecurityvisualizationtechniques
_version_ 1716583966705713152