Logo - springer
Slogan - springer

Computer Science - Image Processing | VizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security

VizSEC 2007

Proceedings of the Workshop on Visualization for Computer Security

Goodall, John R., Conti, Gregory, Ma, Kwan-Liu (Eds.)

2008, XV, 273 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$79.99

(net) price for USA

ISBN 978-3-540-78243-8

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$109.00

(net) price for USA

ISBN 978-3-540-78242-1

free shipping for individuals worldwide

The book title is in reprint. You can already preorder it.


add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$109.00

(net) price for USA

ISBN 978-3-642-09688-4

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.

Content Level » Professional/practitioner

Keywords » Internet - classification - communication - complexity - computer networks - cyber security - information - information security - information visualization - visualization - vizsec

Related subjects » Applications - Computational Science & Engineering - General Issues - Image Processing - Security and Cryptology

Table of contents 

1. Introduction John R. Goodall Section 1: Users and Testing 2. The Real Work of Computer Network Defense Analysts: The Analysis Roles and Processes that Transform Network Data into Security Situation Awareness - Anita D'Amico and Kirsten Whitley 3. Adapting Personas for Use in Security Visualization Design - Jennifer Stoll, David McColgin, Michelle Gregory, Vern Crow, W. Keith Edwards 4. Measuring the Complexity of Computer Security Visualization Designs - Xiaoyuan Suo, Ying Zhu, and G. Scott Owen 5. Integrated Environment Management for Information Operations Testbeds - Tamara H. Yu, Benjamin W. Fuller, John H. Bannick, Lee M. Rossey, and Robert K. Cunningham Section 2: Network Security 6. Visual Analysis of Network Flow Data with Timelines and Event Plots - Doantam Phan, John Gerth, Marcia Lee, Andreas Paepcke and Terry Winograd 7. NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior - Teryl Taylor, Stephen Brooks and John McHugh 8. Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today - Denis Lalanne, Enrico Bertini, Patrick Hertzog and Pedro Bados 9. Visualizing network security events using compound glyphs from a service-oriented perspective - Jason Pearlman and Penny Rheingans 10. High level Internet Scale traffic visualization using Hilbert curve mapping Barry Irwin and Nick Pilkington Section 3: Communication, Characterization, and Context 11. Visalert: From Idea to Product - Stefano Foresti 12. Visually Understanding Jam Resistant Communication - Dino Schweitzer, Leemon Baird, and William Bahn 13. Visualization of Host Behavior for Network Security - Florian Mansmann, Lorenz Meier, and Daniel A. Keim 14. Putting Security in Context: Visual Correlation of Network Activity with Real-World Information - William A. Pike, Chad Scherrer, and Sean Zabriskie Section 4: Attack Graphs and Scans 15. An Interactive Attack Graph Cascade and Reachability Display - Leevar Williams, Richard Lippmann, and Kyle Ingols 16. Intelligent Classification and Visualization of Network Scans - Chris Muelder, Lei Chen, Russell Thomason, Kwan-Liu Ma, and Tony Bartoletti 17. Using InetVis to evaluate Snort and Bro scan detection on a network telescope -Barry V.W. Irwin and Jean-Pierre van Riel

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Imaging, Vision, Pattern Recognition and Graphics.