Abstract
Security Visualization which is largely used in dashboards is to formulate logs saved in text. However, with Internet volumes’ rapid growth, analyzing a vast amount of logs has become quite a challenging job.
For that purpose, this paper proposes a method that prior to the visualization of a whole log, implements a pre-processing log, based on a security matrix and accomplishes an inference of refined data for visualization. Through this process, the time required to analyze a normal log can be curtailed, and with its intuitive visualization function, this process will be useful to detect any Advanced Persistence Threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kasemsri, R.R.: A survey, taxonomy, and analysis of network security visualization techniques. Computer Science Theses 17 (2006)
Ferebee, D., Dasgupta, D.: Security visualization survey. In: Proc. of the 12th Colloquium for Information Systems Security Education (2008)
Krasser, S., et al.: Real-time and forensic network data analysis using animated and coordinated visualization. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005. IEEE (2005)
Komlodi, A., et al.: A user-centered look at glyph-based security visualization. In: IEEE Workshop on Visualization for Computer Security (VizSEC 2005). IEEE (2005)
Fink, G., et al.: Network Eye: End-to-End Computer Security Visualization. In: Submitted for consideration at ACM CCS Workshop on Visualization and Data Mining for Computer Security, VizSec/DMSec (2004)
Stewart, A.: Efficient visualization of change events in enterprise networks. In: Securecomm and Workshops. IEEE (2006)
Irwin, B.V.W., van Riel, J.-P.: Inetvis: a graphical aid for the detection and visualisation of network scans. In: Conference on Vizualisation Security, VizSec2007 (2007)
Chang, B.-H., Na, J.-C., Jang, J.-S.: Network Security Situational Awareness using Traffic Pattern-Map. Journal of the Korea Industrial Information System Society 11(3), 34–39 (2006)
Jeong, C.Y., Sohn, S.-G., Chang, B.-H., Na, J.-C.: An Efficient Method for Analyzing Network Security Situation Using Visualization. Journal of the Korea Institute of Information Security and Cryptology 19(3), 107–117 (2009)
Bro Network Security Monitor, http://www.bro-ids.org
Afterglow, http://afterglow.sourceforge.net
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seo, J., Kwak, J. (2014). Log Pre-processor for Security Visualization. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-41674-3_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41673-6
Online ISBN: 978-3-642-41674-3
eBook Packages: EngineeringEngineering (R0)