Reflecting on visualization for cyber security

In this short position paper, we explore three questions regarding cyber security visualization: (1) why cyber security visualization has not been more effective in the past, (2) how visualization can be utilized in cyber security, and (3) how to evaluate cyber security visualization.

[1]  John R. Goodall,et al.  Visualization is better! A comparative evaluation , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[2]  Ehab Al-Shaer,et al.  PolicyVis: Firewall Security Policy Visualization and Inspection , 2007, LISA.

[3]  Jeffrey C. Carver,et al.  Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization , 2008, VizSEC.

[4]  M. Sheelagh T. Carpendale,et al.  Empirical Studies in Information Visualization: Seven Scenarios , 2012, IEEE Transactions on Visualization and Computer Graphics.

[5]  Bill Cheswick,et al.  Visual analysis of complex firewall configurations , 2012, VizSec '12.

[6]  Catherine Plaisant,et al.  The challenge of information visualization evaluation , 2004, AVI.

[7]  Andreas Butz,et al.  Evaluating information visualization in large companies: challenges, experiences and recommendations , 2010, BELIV '10.

[8]  John McHugh,et al.  FloVis: Leveraging Visualization to Protect Sensitive Network Infrastructure , 2009 .

[9]  John R. Goodall,et al.  Visual analysis of code security , 2010, VizSec '10.

[10]  Serge Mankovskii,et al.  Managing information overload on large enterprise systems , 2011, 2011 8th International Conference & Expo on Emerging Technologies for a Smarter World.

[11]  John McHugh,et al.  Over flow: An overview visualization for network analysis , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[12]  John McHugh,et al.  FloVis: Flow Visualization System , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.