Skip to main content

Log Pre-processor for Security Visualization

  • Conference paper
Book cover Advances in Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 279))

  • 204 Accesses

Abstract

Security Visualization which is largely used in dashboards is to formulate logs saved in text. However, with Internet volumes’ rapid growth, analyzing a vast amount of logs has become quite a challenging job.

For that purpose, this paper proposes a method that prior to the visualization of a whole log, implements a pre-processing log, based on a security matrix and accomplishes an inference of refined data for visualization. Through this process, the time required to analyze a normal log can be curtailed, and with its intuitive visualization function, this process will be useful to detect any Advanced Persistence Threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kasemsri, R.R.: A survey, taxonomy, and analysis of network security visualization techniques. Computer Science Theses 17 (2006)

    Google Scholar 

  2. Ferebee, D., Dasgupta, D.: Security visualization survey. In: Proc. of the 12th Colloquium for Information Systems Security Education (2008)

    Google Scholar 

  3. Krasser, S., et al.: Real-time and forensic network data analysis using animated and coordinated visualization. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005. IEEE (2005)

    Google Scholar 

  4. Komlodi, A., et al.: A user-centered look at glyph-based security visualization. In: IEEE Workshop on Visualization for Computer Security (VizSEC 2005). IEEE (2005)

    Google Scholar 

  5. Fink, G., et al.: Network Eye: End-to-End Computer Security Visualization. In: Submitted for consideration at ACM CCS Workshop on Visualization and Data Mining for Computer Security, VizSec/DMSec (2004)

    Google Scholar 

  6. Stewart, A.: Efficient visualization of change events in enterprise networks. In: Securecomm and Workshops. IEEE (2006)

    Google Scholar 

  7. Irwin, B.V.W., van Riel, J.-P.: Inetvis: a graphical aid for the detection and visualisation of network scans. In: Conference on Vizualisation Security, VizSec2007 (2007)

    Google Scholar 

  8. Chang, B.-H., Na, J.-C., Jang, J.-S.: Network Security Situational Awareness using Traffic Pattern-Map. Journal of the Korea Industrial Information System Society 11(3), 34–39 (2006)

    Google Scholar 

  9. Jeong, C.Y., Sohn, S.-G., Chang, B.-H., Na, J.-C.: An Efficient Method for Analyzing Network Security Situation Using Visualization. Journal of the Korea Institute of Information Security and Cryptology 19(3), 107–117 (2009)

    Google Scholar 

  10. Bro Network Security Monitor, http://www.bro-ids.org

  11. Afterglow, http://afterglow.sourceforge.net

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinwon Seo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seo, J., Kwak, J. (2014). Log Pre-processor for Security Visualization. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41674-3_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41673-6

  • Online ISBN: 978-3-642-41674-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics