Wireless Cyber Assets Discovery Visualization

  • Kenneth Prole
  • John R. Goodall
  • Anita D. D’Amico
  • Jason K. Kopylec
Conference paper

DOI: 10.1007/978-3-540-85933-8_13

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5210)
Cite this paper as:
Prole K., Goodall J.R., D’Amico A.D., Kopylec J.K. (2008) Wireless Cyber Assets Discovery Visualization. In: Goodall J.R., Conti G., Ma KL. (eds) Visualization for Computer Security. Lecture Notes in Computer Science, vol 5210. Springer, Berlin, Heidelberg

Abstract

As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.

Keywords

Visual analytics wireless discovery wireless security coordinated views geographic visualization information visualization wardriving 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Kenneth Prole
    • 1
  • John R. Goodall
    • 1
  • Anita D. D’Amico
    • 1
  • Jason K. Kopylec
    • 1
  1. 1.Secure Decisions division of Applied Visions, Inc.

Personalised recommendations