TY - GEN
T1 - Analysis of Techniques for Visualizing Security Risks and Threats
AU - Udeagwu, Chinyelu Philomena
AU - Sotiriadis, Stelios
AU - Asimakopoulou, Eleana
AU - Bessis, Nik
AU - Trovati, Marcelo
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/11/4
Y1 - 2015/11/4
N2 - The aim of this work is to explore the potential of visualization in order to visualize and manage risks and threats by performing security data analysis. We perform a an analysis of data visualization for identifying and understanding security threat and identify data set(s) to be used with a visualization library in order to visualize activities or threats, analyze data and gain deeper understanding and uncover hidden patterns. The basic structure of the data visualization will be fabricated and visual attributes assigned to the resulting elements. The study utilizes the D3 JavaScript library to visualize detected compromises, threats and attacks existing in a network environment. In particular, the library could visually represent the evidence of several security events such as port sweeps, port scans, malware/worm traffic and clear compromise of the system.
AB - The aim of this work is to explore the potential of visualization in order to visualize and manage risks and threats by performing security data analysis. We perform a an analysis of data visualization for identifying and understanding security threat and identify data set(s) to be used with a visualization library in order to visualize activities or threats, analyze data and gain deeper understanding and uncover hidden patterns. The basic structure of the data visualization will be fabricated and visual attributes assigned to the resulting elements. The study utilizes the D3 JavaScript library to visualize detected compromises, threats and attacks existing in a network environment. In particular, the library could visually represent the evidence of several security events such as port sweeps, port scans, malware/worm traffic and clear compromise of the system.
KW - Security risks Threats
KW - Visualization
UR - http://www.scopus.com/inward/record.url?scp=84964434497&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84964434497&partnerID=8YFLogxK
U2 - 10.1109/3PGCIC.2015.59
DO - 10.1109/3PGCIC.2015.59
M3 - Conference proceeding (ISBN)
AN - SCOPUS:84964434497
T3 - Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
SP - 584
EP - 590
BT - Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
A2 - Messina, Fabrizio
A2 - Xhafa, Fatos
A2 - Ogiela, Marek R.
A2 - Barolli, Leonard
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
Y2 - 4 November 2015 through 6 November 2015
ER -