3. 2
A Survey of Visualization System
for Network Security
H. Shiravi, A. Shiravi, A. A. Ghorbani
IEEE Trans. on Visualization and Computer Graphics
Aug. 2012
5. Challenges in supporting end-user
privacy and security management
with social navigation
Tudumi: Information Visualization System
for Monitoring and Auditing Computer Logs
Closing-the-Loop in Nvisionip: Integrating
Discovery and Search in Security
Visualizations
Visual Correlation of Host Processes and
Network Traffic
Bridging the Host-Network Divide: Survey,
Taxonomy, and Solution
Visualizing Network Data for Intrusion
Detection
xistence Plots: A Low-Resolution Time
eries for Port Behavior Analysis
Re-Inventing Network Security
twork Intrusion Visualization with niva,
Intrusion Detection Visual Analyzer with
ptic Integration
sualizing Cyber Attacks Using ip Matrix
sual Firewall: Real-Time Network Security
onitor
ainstorm: Visualizing ids Alarms
“Visual Correlation for Situational
Awareness
n: A Novel Visual Network-Anomaly
ication Technique
rce Planning, Interactive Monitoring,
terpretation of Security Threats
piralview: Towards Security
olicies Assessment through Visual
Using data type based security alert dialogs
to raise online security awareness
On the challenges in usable security lab studies:
lessons learned from replicating a study on SSL
warnings
Helping Johnny 2.0 to encrypt his
Facebook conversations
ROAuth: recommendation based
open authorization
Visual analysis of code security
多数の論⽂
Intrusion Behavior Detection through Visualization
NVisionIP: Netflow V
State for Security Sit
Visualizing Network Security Events Using
Compound Glyphs from a Service-oriented
Per-spective
Monitoring Network Traffic with Radial
Traffic Analyzer
Visualization of Host Behavior for Network
Security
Home-Centric Visualization of Netw
Traffic for Security Administration
Visflowconnect: Netflow Vis
Link Relationships for Secur
Awareness
Designing Visualization Capabilities
Challenges
Preserving the Big Picture: Visua
Traffic Analysis with tnv
The Spinning Cube of
PortVis: A Tool for Port-Based D
Security Events Netbytes
Visualiza
Behavior
SnortView: Visualization System of Snort
Logs
Idgraphs: Intrusion Detection and Analysis
Using Histographs
A Visualization Paradigm for Ne
Intrusion Detection
Visual Correlation of Network Alerts
Countering Security Information Overload
through Alert and Packet Visualization
Real-Time and Forensic Network Data
Analysis Using Animated and Coordinated
Visualization
Using a Knowledge Represe
Large-Scale Networ
Analysis of Attacks
Visualization of Complex Attacks and
of Attacked Network
Visualizing Graph Dynamics and Similarity
for Enterprise Network Security and
Manage-ment
Ids Alert Visualiza
through Heuristic
Visualizing Interdomain Routing with
BGPlay
Internet
Routing
Anomaly
Detection and
Visualization
Visualizing Internet Routing Changes
Case Study: Interactive Visualization for
Internet Security
Combining Visual and Auto
Mining for Near-Real-Time
Detection and Analysis in
Detecting Flaws and Intruders with Visual
Data Analysis
Bgp Eye: A New Visualization Tool for Real-Time
Detection and Analysis of bgp AnomaliesVisual
analysis of complex firewall configurations
Visual analysis of goal-directed networ
defense decisionsTVi: a visual querying system for network
monitoring and anomaly detection
Monitoring large IP spaces with ClockView
DAEDALUS-VIZ: novel real-time 3D
visualization for darknet monitoring-based
alert system
Nimble cybersecurity incident
management through
visualization and defensible
recommendations
Real-time visualization of network behaviors for
situational awareness
VisTracer: a visual analytics tool to investigate
routing anomalies in traceroutes
Traffic classification using visual motifs: an
empirical evaluation
BURN: baring unknown rogue
Visualization design for immediate
high-level situational assessment
Visual spam
campaigns an
using abstract
representation
Interactive detection of network anomalies via
multiple views
Visualizing attack graphs, reachability,
and trust relationships with
NAVIGATOR
A brick wall, a locked door, and a bandit: a
physical security metaphor for firewall warning
Revealing hidden context: improving mental models of
personal firewall users
Android permissions: user attention,
comprehension, and behavior
Textured agreements: re-envisioning
electronic consent
Demo: Prototype System for Visualizing
Security Risks on Mobile Devices
Visualizing host traffic through graphsAutomated tracing
visualization of soft
security structure a
propertiesMalware images: visualization and
automatic classification&
計72本計72本
8. 7
A brick wall, a locked door, and a bandit: a
physical security metaphor for firewall warnings
Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement
Wang, and Konstantin Beznosov
(Univ. of British Columbia, Dalhausie University)
Symposium on Usable Privacy and
Security (SOUPS '11)
July 2011
ユーザ端末に
おける可視化
⾦岡による分類 設
定
http://cups.cs.cmu.edu/soups/2011/proceedings/a1_Raja.pdf
9. 8
Demo: Prototype System for Visualizing Security
Risks on Mobile Devices
Shinʼichiro Matsuo, Akira Kanaoka, Takeshi
Takahashi, Tadashi Minowa
(NICT)
Symposium on Usable Privacy and
Security (SOUPS '12)
July 2012
ユーザ端末に
おける可視化
⾦岡による分類 ネットワーク
http://cups.cs.cmu.edu/soups/2012/demo/demo04.pdf
10. 9
ROAuth: Recommendation Based Open
Authorization
Mohamed Shehab, Said Marouf, and
Christopher Hudel
(Univ. of North Carolina)
Symposium on Usable Privacy and
Security (SOUPS '11)
July 2011
ユーザ端末に
おける可視化
⾦岡による分類 動き
http://cups.cs.cmu.edu/soups/2011/proceedings/a11_Shehab.pdf
11. 10
Tudumi: Information Visualization System for
Monitoring and Auditing Computer Logs
Tetsuji Takada, Hideki Koike
(Univ. of Electro-Communications)
6th International Conference on
Information Visualization (IV'02)
July 2002
⾦岡による分類 ホスト内部
http://www.netaro.info/~zetaka/publications/papers/tudumi-IV2002.pdf
ネットワーク・SP側に
おける可視化
12. 11
Visualizing Network Security Events using Compound
Glyphs from a Service-Oriented Perspective
Jason Pearlman,
Penny Rheingans
(Henggeler Consulting, Univ. of Maryland Baltimore County)
the Workshop on Visualization for
Computer Security (VizSec2007)
2007
⾦岡による分類 ホスト内部
ネットワーク・SP側に
おける可視化
http://link.springer.com/chapter/10.1007%2F978-3-540-78243-8_9
13. 12
Designing Visualization Capabilities for IDS
Challenges
Robert F. Erbacher, Kim Christensen, and
Amanda Sundberg
(Utah State Univ.)
the Workshop on Visualization for
Computer Security (VizSec2005)
2005
⾦岡による分類 ホスト内部
ネットワーク・SP側に
おける可視化
http://digital.cs.usu.edu/~erbacher/publications/SophisticatedAttackArchitecture-1.pdf
14. 13
IDS RainStorm: Visualizing IDS Alarms
Kulsoom Abdullah, Chris Lee, Gregory Conti,
John A. Copeland, John Stasko
(Georgia Tech)
the Workshop on Visualization for
Computer Security (VizSec2005)
2005
⾦岡による分類 攻撃パターン
ネットワーク・SP側に
おける可視化
http://www.cc.gatech.edu/~john.stasko/papers/vizsec05.pdf
15. 14
Visual Correlation of Network Alerts
Stefano Foresti, James Agutter,
Yarden Livnat, Shaun Moon, and Robert Erbacher
(University of Utah, Utah State University)
IEEE Computer Graphics and Applications
2006
⾦岡による分類 攻撃パターン
ネットワーク・SP側に
おける可視化
http://www.researchgate.net/publication/3209355_Visual_corr
elation_of_network_alerts/file/60b7d5154e9538cf47.pdf
16. 15
Visualizing Interdomain Routing with BGPlay
Lorenzo Colitti, Giuseppe Di Battista, Federico
Mariani, Maurizio Patrignani, Maurizio Pizzonia
(Universit`a di Roma Tre)
Journal of Graph Algorithms and
Applications
2005
⾦岡による分類 通信
ネットワーク・SP側に
おける可視化
http://jgaa.info/accepted/2005/Colitti+2005.9.1.pdf
17. 16
TVi: A Visual Querying System for Network
Monitoring and Anomaly Detection
Alberto Boschetti, Chris Muelder, Luca Salgarelli,
Kwan-Liu Ma (Univ. of Brescia, UC Davis)
the Workshop on Visualization for
Computer Security (VizSec2011)
2011
⾦岡による分類 通信
ネットワーク・SP側に
おける可視化
http://www.vizsec2011.org/program/1-Boschetti.pdf
18. 17
BURN: Baring Unknown Rogue Networks
Francesco Roveta, Luca Di Mario, Federico
Maggi, Giorgio Caviglia, Stefano Zanero, Paolo
Ciuccarelli (Politecnico di Milano)
the Workshop on Visualization for
Computer Security (VizSec2011)
2011
⾦岡による分類 攻撃パターン
ネットワーク・SP側に
おける可視化
http://www.vizsec2011.org/program/6-Roveta.pdf
19. 18
Automated Tracing and Visualization of Software
Security Structure and Properties
Wenbin Fang, Barton P. Miller, James A. Kupsch
(Univ. of Wisconsin Madison)
the Workshop on Visualization for
Computer Security (VizSec2011)
2011
⾦岡による分類 アプリソフトウェアの可視化
http://research.cs.wisc.edu/mist/papers/Wenbin12SecSTAR.pdf
20. 19
Malware Images: Visualization and Automatic
Classification
L. Nataraj S. Karthikeyan, G. Jacob, B. S.
Manjunath (UC Santa Barbara)
the Workshop on Visualization for
Computer Security (VizSec2011)
2011
⾦岡による分類 マルウェアソフトウェアの可視化
http://www.vizsec2011.org/program/4-Nataraj.pdf