Analysis of Techniques for Visualizing Security Risks and Threats

Chinyelu Philomena Udeagwu, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis, Marcelo Trovati

Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

2 Citations (Scopus)

Abstract

The aim of this work is to explore the potential of visualization in order to visualize and manage risks and threats by performing security data analysis. We perform a an analysis of data visualization for identifying and understanding security threat and identify data set(s) to be used with a visualization library in order to visualize activities or threats, analyze data and gain deeper understanding and uncover hidden patterns. The basic structure of the data visualization will be fabricated and visual attributes assigned to the resulting elements. The study utilizes the D3 JavaScript library to visualize detected compromises, threats and attacks existing in a network environment. In particular, the library could visually represent the evidence of several security events such as port sweeps, port scans, malware/worm traffic and clear compromise of the system.

Original languageEnglish
Title of host publicationProceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
EditorsFabrizio Messina, Fatos Xhafa, Marek R. Ogiela, Leonard Barolli
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages584-590
Number of pages7
ISBN (Electronic)9781467394734
DOIs
Publication statusPublished - 4 Nov 2015
Event10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015 - Krakow, Poland
Duration: 4 Nov 20156 Nov 2015

Publication series

NameProceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015

Conference

Conference10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
Country/TerritoryPoland
CityKrakow
Period4/11/156/11/15

Keywords

  • Security risks Threats
  • Visualization

Fingerprint

Dive into the research topics of 'Analysis of Techniques for Visualizing Security Risks and Threats'. Together they form a unique fingerprint.

Cite this