ABSTRACT
The InViz tool is a functional prototype that provides graphical visualizations of log file events to support real-time attack investigation. Through visualization, both experts and novices in cybersecurity can analyze patterns of application behavior and investigate potential cybersecurity attacks. The goal of this research is to identify and evaluate the cybersecurity information to visualize that reduces the amount of time required to perform cyber forensics.
- G. A. Fink, C. L. North, A. Endert, and S. Rose. Visualizing cyber security: Usable workspaces. In Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on, pages 45--56, 2009.Google ScholarCross Ref
- E. Simonsen. glTail.rb - realtime logfile visualization. http://www.fudgie.org, 2007.Google Scholar
- Verizon. 2010 Data Breach Investigations Report. http://goo.gl/28pPGM, 2010.Google Scholar
- Verizon Risk Team. 2013 Data Breach Investigations Report. http://www.verizonenterprise.com/DBIR/2013/, 2013.Google Scholar
- N. Zazworka and C. Ackermann. CodeVizard. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '10, page Article 63, Bolzano, Italy, Sept. 2010.Google Scholar
Index Terms
- InViz: instant visualization of security attacks
Recommendations
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
AbstractSide-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that extract the target information, compromising the system’s security and privacy. Side-channel attacks ...
Teaching security defense through web-based hacking at the undergraduate level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks. Learning defensive techniques and tools can help defend against today's ...
Metrics for V&V of cyber defenses
There is a need for a disciplined approach for evaluating a cyber defense prior to its introduction into an operational environment. This is necessary to assess whether the benefits of the defense will be worth its costs and risks. A traditional V&V ...
Comments