Abstract | ||
---|---|---|
Approaches in security visualization have made significant progress in addressing challenges in the ever changing landscape of network security. However, many approaches are limited in both scope and scale, especially when we consider the complexity of the complete security analysis process. In this article, we review several notable recent systems in security visualization, examining their relative strengths and limitations. We then show that recent research in general network visualization, which often deals with domains other than security, provides new visual metaphors and interaction techniques that will help address limitations in security visualization systems. We examine several of these network visualization approaches in detail, and discuss how they can be applied to meet the challenges of the next generation of security visualization systems. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/MNET.2012.6375887 | Network, IEEE |
Keywords | Field | DocType |
next generation networks,telecommunication security,complete security analysis,general network visualization,network security,next generation,security visualization,visual metaphors | Data science,World Wide Web,Computer science,Visualization,Security engineering,Software security assurance,Cloud computing security,Human-computer interaction in information security,Security information and event management,Network Access Control,Computer security model,Distributed computing | Journal |
Volume | Issue | ISSN |
26 | 6 | 0890-8044 |
Citations | PageRank | References |
8 | 0.52 | 11 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lane Harrison | 1 | 243 | 20.22 |
Aidong Lu | 2 | 353 | 30.18 |