Network Situational Awareness: A Representative Study

Recent developments in visualization techniques for network monitoring and analysis have advanced dramatically over the simple topological graphs and color-coded textual representations found in early systems. These developments are employed in network visualization systems that attempt to present a complete and coherent view of the traffic on a network and the possible security events that may occur. In this paper we describe several representative integrated network visualization systems and discuss the network status and security questions they answer. We then describe an organizational approach to categorizing visualization systems and provide examples of each. We discuss the strengths and weaknesses of each approach and conclude with a proposal for two directions for next-generation systems.

[1]  Hideki Koike,et al.  SnortView: visualization system of snort logs , 2004, VizSEC/DMSEC '04.

[2]  Koji Koyamada,et al.  Hierarchical visualization of network intrusion detection data , 2006, IEEE Computer Graphics and Applications.

[3]  Yifan Li,et al.  VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.

[4]  John T. Stasko,et al.  Countering security information overload through alert and packet visualization , 2006, IEEE Computer Graphics and Applications.

[5]  J. Bradshaw,et al.  Institute for Human and Machine Cognition , 2022 .

[6]  Jeffrey M. Bradshaw,et al.  Dimensions of Adjustable Autonomy and Mixed-Initiative Interaction , 2003, Agents and Computational Autonomy.

[7]  D D'AmicoAnita,et al.  Visual Discovery in Computer Network Defense , 2007 .

[8]  Mary Czerwinski,et al.  Toward Characterizing the Productivity Benefits of Very Large Displays , 2003, INTERACT.

[9]  A. Bradley,et al.  Characterization of spatial aliasing and contrast sensitivity in peripheral vision , 1996, Vision Research.

[10]  Philip K. Chan,et al.  Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , 2004, CCS 2004.

[11]  John R. Goodall,et al.  Visual Discovery in Computer Network Defense , 2007, IEEE Computer Graphics and Applications.

[12]  Robin Jeffries,et al.  CHI '06 Extended Abstracts on Human Factors in Computing Systems , 2006, CHI 2006.

[13]  Chaomei Chen,et al.  An Information-Theoretic View of Visual Analytics , 2008, IEEE Computer Graphics and Applications.

[14]  Yuval Shahar,et al.  An intelligent, interactive tool for exploration and visualization of time-oriented security data , 2006, VizSEC '06.