Chinyelu Philomena Udeagwu, Stelios Sotiriadis, E. Asimakopoulou, N. Bessis, M. Trovati
{"title":"安全风险和威胁可视化技术分析","authors":"Chinyelu Philomena Udeagwu, Stelios Sotiriadis, E. Asimakopoulou, N. Bessis, M. Trovati","doi":"10.1109/3PGCIC.2015.59","DOIUrl":null,"url":null,"abstract":"The aim of this work is to explore the potential of visualization in order to visualize and manage risks and threats by performing security data analysis. We perform a an analysis of data visualization for identifying and understanding security threat and identify data set(s) to be used with a visualization library in order to visualize activities or threats, analyze data and gain deeper understanding and uncover hidden patterns. The basic structure of the data visualization will be fabricated and visual attributes assigned to the resulting elements. The study utilizes the D3 JavaScript library to visualize detected compromises, threats and attacks existing in a network environment. In particular, the library could visually represent the evidence of several security events such as port sweeps, port scans, malware/worm traffic and clear compromise of the system.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"70 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Analysis of Techniques for Visualizing Security Risks and Threats\",\"authors\":\"Chinyelu Philomena Udeagwu, Stelios Sotiriadis, E. Asimakopoulou, N. Bessis, M. Trovati\",\"doi\":\"10.1109/3PGCIC.2015.59\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of this work is to explore the potential of visualization in order to visualize and manage risks and threats by performing security data analysis. We perform a an analysis of data visualization for identifying and understanding security threat and identify data set(s) to be used with a visualization library in order to visualize activities or threats, analyze data and gain deeper understanding and uncover hidden patterns. The basic structure of the data visualization will be fabricated and visual attributes assigned to the resulting elements. The study utilizes the D3 JavaScript library to visualize detected compromises, threats and attacks existing in a network environment. In particular, the library could visually represent the evidence of several security events such as port sweeps, port scans, malware/worm traffic and clear compromise of the system.\",\"PeriodicalId\":395401,\"journal\":{\"name\":\"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)\",\"volume\":\"70 4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/3PGCIC.2015.59\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2015.59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Techniques for Visualizing Security Risks and Threats
The aim of this work is to explore the potential of visualization in order to visualize and manage risks and threats by performing security data analysis. We perform a an analysis of data visualization for identifying and understanding security threat and identify data set(s) to be used with a visualization library in order to visualize activities or threats, analyze data and gain deeper understanding and uncover hidden patterns. The basic structure of the data visualization will be fabricated and visual attributes assigned to the resulting elements. The study utilizes the D3 JavaScript library to visualize detected compromises, threats and attacks existing in a network environment. In particular, the library could visually represent the evidence of several security events such as port sweeps, port scans, malware/worm traffic and clear compromise of the system.