An incremental dimensionality reduction method for visualizing streaming multidimensional data

T Fujiwara, JK Chou, S Shilpika, P Xu… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Dimensionality reduction (DR) methods are commonly used for analyzing and visualizing
multidimensional data. However, when data is a live streaming feed, conventional DR …

Netcapvis: Web-based progressive visual analytics for network packet captures

A Ulmer, D Sessler… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Network traffic log data is a key data source for forensic analysis of cybersecurity incidents.
Packet Captures (PCAPs) are the raw information directly gathered from the network device …

[PDF][PDF] A visual analytics approach for the cyber forensics based on different views of the network traffic.

IV Kotenko, M Kolomeets, A Chechulin… - J. Wirel. Mob. Networks …, 2018 - academia.edu
Network forensics is based on the analysis of network traffic. Traffic analysis is a routine
procedure, but it allows one to not only identify the cause of the security breach, but also …

Riverside: A design study on visualization for situation awareness in cybersecurity

K DeValk, N Elmqvist - Information Visualization, 2024 - journals.sagepub.com
Real-time situation awareness is a key challenge of cybersecurity defense. Visual analytics
has been utilized for this purpose, but existing tools tend to require detailed knowledge …

Visualizing automatically detected periodic network activity

R Gove, L Deason - 2018 IEEE Symposium on Visualization for …, 2018 - ieeexplore.ieee.org
Malware frequently leaves periodic signals in network logs, but these signals are easily
drowned out by non-malicious periodic network activity, such as software updates and other …

Analysis of visualization systems for cyber security

H Zhao, W Tang, X Zou, Y Wang, Y Zu - Recent Developments in Intelligent …, 2019 - Springer
Cyber security visualization is becoming a hot research field. Visualization and interactive
analysis can greatly help network managers and analysts monitor network, detect …

Visual firewall log analysis-at the border between analytical and appealing

M Schufrin, H Lücke-Tieke… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
In this paper, we present our design study on develo** an interactive visual firewall log
analysis system in collaboration with an IT service provider. We describe the human …

A GRU-based traffic situation prediction method in multi-domain software defined network

W Sun, S Guan - PeerJ Computer Science, 2022 - peerj.com
With the continuous development and improvement of Software-Defined Networking (SDN),
large-scale networks are divided into multiple domains. Each domain, which is managed by …

Frankenstack: Real-time cyberattack detection and feedback system for technical cyber exercises

M Pihelgas, M Kont - … on Cyber Security and Resilience (CSR), 2021 - ieeexplore.ieee.org
This paper describes a situation awareness framework, Frankenstack, that is the result of a
multi-faceted endeavor to enhance the expertise of cybersecurity specialists by providing …

Frankenstack: Toward real-time red team feedback

M Kont, M Pihelgas, K Maennel… - MILCOM 2017-2017 …, 2017 - ieeexplore.ieee.org
Cyber Defense Exercises have received much attention in recent years, and are
increasingly becoming the cornerstone for ensuring readiness in this new domain. Crossed …