Skip to main content

Visual Security Analytics

  • Living reference work entry
  • First Online:
Encyclopedia of Cryptography, Security and Privacy
  • 37 Accesses

Synonyms

Security visualization

Definition

Despite the application of increasingly advanced methods and technologies to automate tasks within cyber security, human domain knowledge remains indispensable. Especially monitoring a system’s security posture as well as detecting and analyzing cyber threats requires involvement of security experts. However, the large amount of data relevant for these tasks poses a major impediment for any kind of manual analyses. It is therefore necessary, to enable security experts to efficiently deal with large amounts of data. Visual Security Analytics (VSA) aims to achieve this through generating interactive visual representations of log data or any other data relevant for monitoring, ensuring, and preserving cyber security and covering different ways of analyzing security data using visual approaches (Marty 2009). It is a combination of automated and visual analysis aiming for a “best-of-both” worlds approach. Thus, VSA is a highly interdisciplinary...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Brehmer M, Munzner T (2013) A multi-level typology of abstract visualization tasks. IEEE Trans Vis Comput Graph 19(12):2376–2385

    Article  Google Scholar 

  • Federico P, Wagner M, Rind A, Amor-Amorós A, Miksch S, Aigner W (2017) The role of explicit knowledge: a conceptual model of knowledge-assisted visual analytics. In: Proceedings of the IEEE conference on visual analytics science and technology (VAST), Phoenix, pp 92–103

    Google Scholar 

  • Goodall JR (2008) Introduction to visualization for computer security. In: VizSEC 2007, Mathematics and visualization, Springer, Berlin, Heidelberg, pp 1–17

    Google Scholar 

  • Hall P, Heath C, Coles-Kemp L (2015) Critical visualization: a case for rethinking how we visualize risk and security. J Cyber Secur 1(1):93–108

    Google Scholar 

  • Jacobs J, Rudis B (2014) Data-driven security analysis, visualization, and dashboards. John Wiley & Sons, Hoboken, New Jersey

    Google Scholar 

  • Keim D, Kohlhammer J, Ellis G, Mansmann F (2010) Mastering the information age – solving problems with visual analytics. Eurographics, Geneve

    Google Scholar 

  • Kirk A (2019) Data visualisation. A handbook for data driven design, 2nd edn. Sage, London

    Google Scholar 

  • Marty R (2009) Applied security visualization. Addison Wesley, Boston, Massachusetts

    Google Scholar 

  • Meyer M, Sedlmair M, Quinan P, Munzner T (2015) The nested blocks and guidelines model. Inf Vis 14(3):234–249

    Article  Google Scholar 

  • Sacha D, Stoffel A, Stoffel F, Kwon B, Ellis G, Keim D (2014) Knowledge generation model for visual analytics. IEEE Trans Vis Comput Graph 20(12):1604–1613

    Article  Google Scholar 

  • Thomas J, Cook K (2005) Illuminating the path. The research and development agenda for visual analytics. IEEE Computer Society Press, Los Alamitos, California

    Google Scholar 

  • Ware C (2012) Information visualization, 3rd edn. Morgan Kaufmann, Waltham, Massachusetts

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fabian Böhm .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Science+Business Media LLC

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Böhm, F. (2021). Visual Security Analytics. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1674-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27739-9_1674-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27739-9

  • Online ISBN: 978-3-642-27739-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics