A survey of network anomaly visualization

T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
Network anomaly analysis is an emerging subtopic of network security. Network anomaly
refers to the unusual behavior of network devices or suspicious network status. A number of …

Opportunities and challenges for human-machine teaming in cybersecurity operations

C Lyn Paul, LM Blaha, CK Fallon… - Proceedings of the …, 2019 - journals.sagepub.com
Many of the challenges associated with cybersecurity operations are also ripe opportunities
for the application of human-machine teaming. Advances in cognitive science, artificial …

Methods and systems for improving analytics in distributed networks

CY Shieh, TWF Chou - US Patent 10,193,929, 2019 - Google Patents
Systems and methods for improving analytics in a distrib uted network are described herein.
An example system includes at least one processor, an analytics module, and a security …

Deception using distributed threat detection

CY Shieh, M Woolward, Z Liu, CL Hou… - US Patent …, 2018 - Google Patents
Methods and systems for deception using distributed threat detection are provided.
Exemplary methods by an enforcement point, the enforcement point communicatively …

Netcapvis: Web-based progressive visual analytics for network packet captures

A Ulmer, D Sessler… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Network traffic log data is a key data source for forensic analysis of cybersecurity incidents.
Packet Captures (PCAPs) are the raw information directly gathered from the network device …

Visual firewall log analysis-at the border between analytical and appealing

M Schufrin, H Lücke-Tieke… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
In this paper, we present our design study on develo** an interactive visual firewall log
analysis system in collaboration with an IT service provider. We describe the human …

Understanding the context of network traffic alerts

BCM Cappers, JJ van Wijk - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
For the protection of critical infrastructures against complex virus attacks, automated network
traffic analysis and deep packet inspection are unavoidable. However, even with the use of …

Conditional declarative policies

JJ Lian, A Paterra, M Woolward - US Patent 10,333,986, 2019 - Google Patents
Methods, systems, and media for producing a firewall rule set are provided herein.
Exemplary methods may include receiving a declarative policy associated with a computer …

Anomaly detection in the HVAC system operation by a RadViz based visualization-driven approach

E Novikova, M Bestuzhev, I Kotenko - … 27, 2019 Revised Selected Papers 5, 2020 - Springer
The appearance of the smart houses, buildings, and cities has defined new attack scenarios
targeting industrial information systems. The paper suggests a visualization-driven approach …

Evaluating visualization approaches to detect abnormal activities in network traffic data

SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …