Udeagwu, C.P. and Sotiriadis, Stelios and Asimakopoulou, E. and Bessis, N. and Trovati, M. (2015) Analysis of techniques for visualizing security risks and threats. In: UNSPECIFIED (ed.) P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015 10th International Conference on. IEEE, pp. 584-590. ISBN 9781467394734.
Text
07424632.pdf - Published Version of Record Restricted to Repository staff only Download (165kB) |
Abstract
The aim of this work is to explore the potential of visualization in order to visualize and manage risks and threats by performing security data analysis. We perform a an analysis of data visualization for identifying and understanding security threat and identify data set(s) to be used with a visualization library in order to visualize activities or threats, analyze data and gain deeper understanding and uncover hidden patterns. The basic structure of the data visualization will be fabricated and visual attributes assigned to the resulting elements. The study utilizes the D3 JavaScript library to visualize detected compromises, threats and attacks existing in a network environment. In particular, the library could visually represent the evidence of several security events such as port sweeps, port scans, malware/worm traffic and clear compromise of the system.
Metadata
Item Type: | Book Section |
---|---|
Keyword(s) / Subject(s): | Java, data visualisation, invasive software, software libraries, D3 JavaScript library, data visualization, malware-worm traffic, port scans, port sweeps, security data analysis, security risk visualization, security threat, visualization library, Cognition, Data visualization, Libraries, Market research, Organizations, Security, Visualization, Security risks Threats, Visualization |
School: | Birkbeck Faculties and Schools > Faculty of Science > School of Computing and Mathematical Sciences |
Research Centres and Institutes: | Birkbeck Knowledge Lab |
Depositing User: | Stelios Sotiriadis |
Date Deposited: | 10 May 2018 11:13 |
Last Modified: | 09 Aug 2023 12:43 |
URI: | https://eprints.bbk.ac.uk/id/eprint/21813 |
Statistics
Additional statistics are available via IRStats2.