RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support

  • João P. S. Medeiros
  • Selan R. dos Santos
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5508)


The pervasive aspect of the Internet increases the demand for tools that support both monitoring and auditing of security aspects in computer networks. Ideally, these tools should provide a clear and objective presentation of security data in such a way as to let network administrators detect or even predict network security breaches. However, most of these data are still presented only in raw text form, or through inadequate data presentation techniques. Our work tackles this problem by designing and developing a powerful tool that aims at integrating several information visualization techniques in an effective and expressive visualization. We have tested our tool in the context of network security, presenting two case studies that demonstrate important features such as scalability and detection of critical network security issues.


Network Security Cone Tree Information Visualization Visual Metaphor Wireless Access Point 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Sandalski, S.: fe3d,
  2. 2.
    Galstad, E.: Nagios,
  3. 3.
    Priddy, B.: Cheops-ng,
  4. 4.
    Robertson, G.G., Mackinlay, J.D., Card, S.K.: Cone trees: animated 3d visualizations of hierarchical information. In: Proceedings of the 1991 SIGCHI Conference on Human factors in computing systems, pp. 189–194. ACM Press, New York (1991)Google Scholar
  5. 5.
    Chalmers, M.: Tutorial: Design and perception in information visualisation. In: 25th International Conference on Very Large Data Bases (1999)Google Scholar
  6. 6.
    Eades, P.: Drawing free trees. Bulletin of the Institute for Combinatorics and its Applications 5, 10–36 (1992)MathSciNetzbMATHGoogle Scholar
  7. 7.
    Teoh, S.T., Ma, K.L., Wu, S.F., Jankun-Kelly, T.J.: Detecting flaws and intruders with visual data analysis. IEEE Comput. Graph. Appl. 24(5), 27–35 (2004)CrossRefGoogle Scholar
  8. 8.
    Muelder, C., Ma, K.L., Bartoletti, T.: Interactive visualization for network and port scan detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 265–283. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  9. 9.
    Conti, G.: Security Data Visualization – Graphical Techniques for Network Analysis, 1st edn. No Starch Press (2007)Google Scholar
  10. 10.
  11. 11.
    NIST: National Vulnerability Database – NVD,
  12. 12.
    Lutz, M.: Programming Python, 3rd edn. O’Reilly Media, Sebastopol (2006)zbMATHGoogle Scholar
  13. 13.
    Card, S., Mackinlay, J., Shneiderman, B. (eds.): Readings in Information Visualization - Using Vision to Think. Morgan Kaufmann Publishers, Inc., San Francisco (1999)Google Scholar
  14. 14.
    Bertin, J.: Semiology of Graphics: Diagrams, Networks, Maps. University of Wisconsin Press (1983)Google Scholar
  15. 15.
    Mackinlay, J.: Automating the design of graphical presentations of relational information. ACM Transaction on Graphics 5(2), 110–141 (1986)CrossRefGoogle Scholar
  16. 16.
    Frøkjær, E., Hertzum, M., Hornbæk, K.: Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? In: CHI 2000: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 345–352. ACM, New York (2000)Google Scholar
  17. 17.
    Kosara, R., Healey, C.G., Interrante, V., Laidlaw, D.H., Ware, C.: User studies: Why, how, and when? Computer Graphics and Applications 623(4), 20–25 (2003)CrossRefGoogle Scholar
  18. 18.
    Yee, K.P., Fisher, D., Dhamija, R., Hearst, M.A.: Animated exploration of dynamic graphs with radial layout. In: INFOVIS, pp. 43–50 (2001)Google Scholar
  19. 19.
    Mickinlay, J.D., Robertson, G.G., Card, S.K.: The perspective wall: detail and context smoothly integrated. In: Carroll, J.M., Tanner, P.P. (eds.) Proceedings of the 1987 SIGCHI Conference on Human Factors in Computing Systems and Graphics Interface, pp. 173–179. ACM Press, New York (1987)Google Scholar
  20. 20.
    Furnas, G.W.: The FISHEYE view: A new look at structured files. Technical Report #81-11221-9, Bell Labs, Murray Hill, New Jersey 07974, U.S.A. (December 1981)Google Scholar
  21. 21.
    Becker, R., Cleveland, W.: Brushing scatterplots. Technometrics 29(2), 127–142 (1987)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Plaisant, C.: The challenge of information visualization evaluation. In: Proceedings of the working conference on Advanced Visual Interfaces (AVI 2004), pp. 109–116. ACM Press, New York (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • João P. S. Medeiros
    • 1
  • Selan R. dos Santos
    • 2
  1. 1.Department of Computer Engineering and AutomationFederal University of Rio Grande do NorteNatal/RNBrazil
  2. 2.Department of Informatics and Applied MathematicsFederal University of Rio Grande do NorteNatal/RNBrazil

Personalised recommendations