skip to main content
10.1145/2600176.2600191acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
research-article

InViz: instant visualization of security attacks

Authors Info & Claims
Published:08 April 2014Publication History

ABSTRACT

The InViz tool is a functional prototype that provides graphical visualizations of log file events to support real-time attack investigation. Through visualization, both experts and novices in cybersecurity can analyze patterns of application behavior and investigate potential cybersecurity attacks. The goal of this research is to identify and evaluate the cybersecurity information to visualize that reduces the amount of time required to perform cyber forensics.

References

  1. G. A. Fink, C. L. North, A. Endert, and S. Rose. Visualizing cyber security: Usable workspaces. In Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on, pages 45--56, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  2. E. Simonsen. glTail.rb - realtime logfile visualization. http://www.fudgie.org, 2007.Google ScholarGoogle Scholar
  3. Verizon. 2010 Data Breach Investigations Report. http://goo.gl/28pPGM, 2010.Google ScholarGoogle Scholar
  4. Verizon Risk Team. 2013 Data Breach Investigations Report. http://www.verizonenterprise.com/DBIR/2013/, 2013.Google ScholarGoogle Scholar
  5. N. Zazworka and C. Ackermann. CodeVizard. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '10, page Article 63, Bolzano, Italy, Sept. 2010.Google ScholarGoogle Scholar

Index Terms

  1. InViz: instant visualization of security attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
      April 2014
      184 pages
      ISBN:9781450329071
      DOI:10.1145/2600176

      Copyright © 2014 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 April 2014

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      HotSoS '14 Paper Acceptance Rate12of21submissions,57%Overall Acceptance Rate34of60submissions,57%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader