Skip to main content

Visualizations and Analysts

  • Chapter
  • First Online:
Book cover Cyber Defense and Situational Awareness

Part of the book series: Advances in Information Security ((ADIS,volume 62))

Abstract

The challenges of CSA discussed in previous chapters call for ways to provide assistance to analysts and decision-makers. In many fields, analyses of complex systems and activities benefit from visualization of data and analytical products. Analysts use images in order to engage their visual perception in identifying features in the data, and to apply the analysts’ domain knowledge. One would expect the same to be true in the practice of cyber analysts as they try to form situational awareness of complex networks. Earlier, the Cognition and Technology chapter introduced the topic of visualization: its criticality to the users, e.g., cyber analysts, as well as its pitfalls and limitations. Now, this chapter takes a close look at visualization for Cyber Situational Awareness. We begin with a basic overview of scientific and information visualization, and of recent visualization systems for cyber situation awareness. Then, we outline a set of requirements, derived largely from discussions with expert cyber analysts, for a candidate visualization system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Bertin, J (1967) SĂ©miologie Graphiques: Les diagrammes, les rĂ©seaux, les cartes. Gauthier-Villars, Paris

    Google Scholar 

  • Bradshaw, J M, Carvalho, M, Bunch, L et al (2012) Sol: An agent-based framework for cyber situation awareness. KĂĽnstliche Intelligenz 26(2):127–140

    Article  Google Scholar 

  • Chernoff, H (1973) The use of faces to represent points in \( k \)-dimensional space graphically. Journal of the American Statistical Association 68(342):361–368

    Google Scholar 

  • Cockburn, A, Karlson, A, and Bederson, B B (2008) A review of overview+detail, zooming, and focus+context interfaces. ACM Computing Surveys 41(1):Article 2

    Google Scholar 

  • Dang, K T and Dang, T T (2013) A survey on security visualization techniques for web information systems. International Journal of Web Information Systems 9(1):6–31

    Article  Google Scholar 

  • DeFanti, B H and Brown, T A (1987) Visualization in scientific computing. Computer Graphics 21(6)

    Google Scholar 

  • Goodall, J and Sowul, M (2009) VIAssist: Visual analytics for cyber defense. Paper presented at the IEEE Conference on Technologies for Homeland Security (HST ’09), Boston, MA

    Google Scholar 

  • Heyes, R (2014) RGraph: HTML5 charts library. http://www.rgraph.net. Accessed 02 May 2014

  • Johnson, C R (2004) Top scientific visualization research problems. IEEE Computer Graphics & Applications 24(4):13–17

    Article  Google Scholar 

  • Johnson, C R, Moorehead, R, Munzner, T et al (eds) (2006) NIH/NSF Visualization Research Challenges. IEEE Press

    Google Scholar 

  • Kan, Z, Hu, C, Wang, Z et al (2010) NetVis: A network security management visualization tool based on treemap. Paper presented at the 2nd International Conference on Advanced Computer Control (ICACC 2010), Shenyang, China

    Google Scholar 

  • Lakkaraju, K, Yurcik, W and Lee, A J (2004) NVisionIP: Netflow visualizations of system state for security situational awareness. Paper presented at the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC ’04), Washington, DC

    Google Scholar 

  • Mansmann, F, Fisher, F, Keim, D A et al (2009) Visual support for analyzing network traffic and intrusion detection events using treemap and graph representations. Paper presented at the Symposium on Computer-Human Interaction for Management of Information (CHIMIT 2009), Baltimore, MD

    Google Scholar 

  • McPherson, J, Ma, K, Krystosk, P et al (2004) PortVis: A tool for port-based detection of security events. Paper presented at the Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC ’04), Washington, DC

    Google Scholar 

  • Minarik, P and Dymacek, T (2008) NetFlow data visualization based on graphs. In: Visualization for Computer Security, Springer, pp 144–151

    Google Scholar 

  • Phan, D, Gerth, J, Lee, M, Paepcke et al (2007) Visual analysis of network flow data with timelines and event plots. Paper presented in the Proceedings of the 4th International Workshop on Visualization for Cyber Security (VizSec 2007), Sacramento, CA

    Google Scholar 

  • Roberts, J C, Faithfull, W J and Williams, F C B (2012) SitaVis—Interactive situation awareness visualization of large datasets. Paper presented in the Proceedings 2012 Conference on Visual Analytics Science and Technology (VAST 2012), Seattle, WA

    Google Scholar 

  • Shiravi, H, Shiravi, A, and Ghorbani, A A (2012) A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics 18(8):1313–1329

    Article  Google Scholar 

  • Thomas, J J and Cook, K A (2005) Illuminating the path: The research and development agenda for visual analytics. National Visualization and Analytics Center

    Google Scholar 

  • Tricaud, S, Nance, K, and Saade, P (2011) Visualizing network activity using parallel coordinates. Paper presented in the Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS 2011), Poipu, HI

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christopher G. Healey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Healey, C.G., Hao, L., Hutchinson, S.E. (2014). Visualizations and Analysts. In: Kott, A., Wang, C., Erbacher, R. (eds) Cyber Defense and Situational Awareness. Advances in Information Security, vol 62. Springer, Cham. https://doi.org/10.1007/978-3-319-11391-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11391-3_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11390-6

  • Online ISBN: 978-3-319-11391-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics