Wireless Cyber Assets Discovery Visualization

  • Kenneth Prole
  • John R. Goodall
  • Anita D. D’Amico
  • Jason K. Kopylec
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5210)

Abstract

As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.

Keywords

Visual analytics wireless discovery wireless security coordinated views geographic visualization information visualization wardriving 

References

  1. 1.
    Hole, K., Dyrnes, E., Thorsheim, P.: Securing Wi-Fi Networks. Computer 38(7), 28–34 (2005)CrossRefGoogle Scholar
  2. 2.
    Pereira, J.: Breaking The Code: How Credit-Card Data Went Out Wireless Door. Wall Street Journal, 5/4/07 Issue (2007)Google Scholar
  3. 3.
    PCI Security Standards Council (Accessed 1 June 2008), https://www.pcisecuritystandards.org
  4. 4.
    NetStumbler (Accessed 1 June 2008), http://www.netstumbler.com
  5. 5.
    Kismet (Accessed 1 June 2008), http://www.kismetwireless.net
  6. 6.
    Hurley, C., Thornton, F., Rogers, R., Connelly, D., Baker, B.: WarDriving & Wireless Penetration Testing, pp. 219–246. Syngress Publishing, Inc. (2007)Google Scholar
  7. 7.
    StumbVerter (Accessed 1 June 2008), http://www.sonar-security.com/sv.html
  8. 8.
    KNSGEM (Accessed 1 June 2008), http://www.rjpi.com/knsgem.htm
  9. 9.
    Kismet Earth (Accessed 1 June 2008), http://www.niquille.com/kismet-earth
  10. 10.
    Bittau, A.: WiFi Exposed, Crossroads, vol. 11(1), p. 3. ACM Press, New York (2004)Google Scholar
  11. 11.
    Wireless Network Visualization Project (Accessed 1 June 2008), http://www.ittc.ku.edu/wlan
  12. 12.
    Lentz, C.: 802.11b Wireless Network Visualization and Radiowave Propagation Modeling, Dartmouth College Technical Report TR2003-451 (2003)Google Scholar
  13. 13.
    Connelly, C., Liu, Y., Bulwinkle, D., Miller, A., Bobbitt, I.: A Toolkit for Automatically Constructing Outdoor Radio Maps. In: International Conference on Information Technology: Coding and Computing (ITCC 2005), vol. II, pp. 248–253 (2005)Google Scholar
  14. 14.
    Zhou, L., Zygmunt, H.: Securing Ad Hoc Networks, IEEE Networks Special Issue on Network Security. Cornell University, Ithaca (1999)Google Scholar
  15. 15.
    Department of Defense Directive Number 8100.2 (Accessed 1 June 2008), http://www.dtic.mil/dticasd/sbir/sbir041/srch/n076.pdf
  16. 16.
    HIPAA Security Standard (Accessed 1 June 2008), http://www.cms.hhs.gov/SecurityStandard
  17. 17.
    ArcGIS Online (Accessed 1 June 2008), http://www.esri.com/software/arcgis/arcgisonline
  18. 18.
    Tufte, E.: Envisioning Information, pp. 67–79. Graphics Press (1990)Google Scholar
  19. 19.
    Eclipse Rich Client Platform (Accessed 1 June 2008), http://eclipse.org/rcp
  20. 20.
    The Standard Widget Toolkit (SWT) (Accessed 1 June 2008), http://eclipse.org/swt
  21. 21.
    ArcGIS (Accessed 1 June 2008), http://www.esri.com/software/arcgis
  22. 22.
    NASA World Wind (Accessed 1 June 2008), http://worldwind.arc.nasa.gov
  23. 23.
    Heer, J., Card, S.K., Landay, J.A.: Prefuse: A Toolkit For Interactive Information Visualization. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 421–430. ACM Press, New York (2005)Google Scholar
  24. 24.
    Oracle TopLink Essentials JPA (Accessed 1 June 2008), http://www.oracle.com/technology/products/ias/toplink/jpa/index.html
  25. 25.
    H2 Database Engine (Accessed 1 June 2008), www.h2database.com

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Kenneth Prole
    • 1
  • John R. Goodall
    • 1
  • Anita D. D’Amico
    • 1
  • Jason K. Kopylec
    • 1
  1. 1.Secure Decisions division of Applied Visions, Inc.

Personalised recommendations