Visualization for Computer Security pp 136-143
Wireless Cyber Assets Discovery Visualization
- Cite this paper as:
- Prole K., Goodall J.R., D’Amico A.D., Kopylec J.K. (2008) Wireless Cyber Assets Discovery Visualization. In: Goodall J.R., Conti G., Ma KL. (eds) Visualization for Computer Security. Lecture Notes in Computer Science, vol 5210. Springer, Berlin, Heidelberg
As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.
KeywordsVisual analytics wireless discovery wireless security coordinated views geographic visualization information visualization wardriving
Unable to display preview. Download preview PDF.