Synonyms
Definition
Despite the application of increasingly advanced methods and technologies to automate tasks within cyber security, human domain knowledge remains indispensable. Especially monitoring a system’s security posture as well as detecting and analyzing cyber threats requires involvement of security experts. However, the large amount of data relevant for these tasks poses a major impediment for any kind of manual analyses. It is therefore necessary, to enable security experts to efficiently deal with large amounts of data. Visual Security Analytics (VSA) aims to achieve this through generating interactive visual representations of log data or any other data relevant for monitoring, ensuring, and preserving cyber security and covering different ways of analyzing security data using visual approaches (Marty 2009). It is a combination of automated and visual analysis aiming for a “best-of-both” worlds approach. Thus, VSA is a highly interdisciplinary...
References
Brehmer M, Munzner T (2013) A multi-level typology of abstract visualization tasks. IEEE Trans Vis Comput Graph 19(12):2376–2385
Federico P, Wagner M, Rind A, Amor-Amorós A, Miksch S, Aigner W (2017) The role of explicit knowledge: a conceptual model of knowledge-assisted visual analytics. In: Proceedings of the IEEE conference on visual analytics science and technology (VAST), Phoenix, pp 92–103
Goodall JR (2008) Introduction to visualization for computer security. In: VizSEC 2007, Mathematics and visualization, Springer, Berlin, Heidelberg, pp 1–17
Hall P, Heath C, Coles-Kemp L (2015) Critical visualization: a case for rethinking how we visualize risk and security. J Cyber Secur 1(1):93–108
Jacobs J, Rudis B (2014) Data-driven security analysis, visualization, and dashboards. John Wiley & Sons, Hoboken, New Jersey
Keim D, Kohlhammer J, Ellis G, Mansmann F (2010) Mastering the information age – solving problems with visual analytics. Eurographics, Geneve
Kirk A (2019) Data visualisation. A handbook for data driven design, 2nd edn. Sage, London
Marty R (2009) Applied security visualization. Addison Wesley, Boston, Massachusetts
Meyer M, Sedlmair M, Quinan P, Munzner T (2015) The nested blocks and guidelines model. Inf Vis 14(3):234–249
Sacha D, Stoffel A, Stoffel F, Kwon B, Ellis G, Keim D (2014) Knowledge generation model for visual analytics. IEEE Trans Vis Comput Graph 20(12):1604–1613
Thomas J, Cook K (2005) Illuminating the path. The research and development agenda for visual analytics. IEEE Computer Society Press, Los Alamitos, California
Ware C (2012) Information visualization, 3rd edn. Morgan Kaufmann, Waltham, Massachusetts
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2021 Springer Science+Business Media LLC
About this entry
Cite this entry
Böhm, F. (2021). Visual Security Analytics. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1674-1
Download citation
DOI: https://doi.org/10.1007/978-3-642-27739-9_1674-1
Received:
Accepted:
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27739-9
Online ISBN: 978-3-642-27739-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering