Methodological Primitives for Phased Construction of Data Visualization Models

The paper considers common methodological primitives for phased construction of data visualization models, which will help to create new graphical models of data security visualization, or will help to show advantages and disadvantages of existing models. The paper also considers examples of graphical models and additional tools, which allow to work with these models. The purpose of the paper is to form a comprehensive vision to create data security visualization models. The primitives classification and communication between them are suggested. On the base of identified primitives, graphical models and additional tools to work with graphical models, a methodology for constructing data security visualization models is provided. This methodology can be used for improving efficiency of existing models and for evaluating their effectiveness. The paper also considers a new visualization model for network security which was developed based on the proposed visualization process.

[1]  James Moody,et al.  Data Visualization in Sociology. , 2014, Annual review of sociology.

[2]  Marian Dörk,et al.  Visual filter: graphical exploration of network security log files , 2014, VizSec '14.

[3]  B. Marx The Visual Display of Quantitative Information , 1985 .

[4]  Raffael Marty,et al.  Applied Security Visualization , 2008 .

[5]  Igor V. Kotenko,et al.  Visualization of Security Metrics for Cyber Situation Awareness , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[6]  Kara Nance,et al.  Visualizing Network Activity Using Parallel Coordinates , 2011, 2011 44th Hawaii International Conference on System Sciences.

[7]  James D. Hollan,et al.  Direct Manipulation Interfaces , 1985, Hum. Comput. Interact..

[8]  Edward Tufte,et al.  Visual Explanations , 1997 .

[9]  Manojit Sarkar,et al.  Graphical fisheye views , 1994, CACM.

[10]  Dennis Gamayunov,et al.  Visualization of complex attacks and state of attacked network , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[11]  Edward R. Tufte,et al.  Envisioning Information , 1990 .

[12]  Igor V. Kotenko,et al.  Analytical Visualization Techniques for Security Information and Event Management , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.

[13]  Ben Shneiderman,et al.  The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.

[14]  Kwan-Liu Ma Cyber security through visualization , 2006, APVIS.

[15]  Igor V. Kotenko,et al.  A Cyber Attack Modeling and Impact Assessment framework , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[16]  Lisa Falschlunger,et al.  Development of a Data Visualization Model based on Information Processing Theory , 2015 .

[17]  Robert Bruce Whitaker,et al.  Applying Information Visualization to Computer Security Applications , 2010 .

[19]  Sophie Engle,et al.  Visualizing distributed memory computations with hive plots , 2012, VizSec '12.

[20]  Allison Woodruff,et al.  Guidelines for using multiple views in information visualization , 2000, AVI '00.

[21]  Philipp Koehn,et al.  Cognitive Psychology , 1992, Ageing and Society.

[22]  D. Dasgupta,et al.  Security Visualization Survey , 2008 .