By Topic

Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on

Date 11-11 Oct. 2009

Filter Results

Displaying Results 1 - 23 of 23
  • [Title page]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (16 KB)  
    Freely Available from IEEE
  • Contents

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • Message from the workshop chairs

    Publication Year: 2009 , Page(s): iv - v
    Save to Project icon | Request Permissions | PDF file iconPDF (298 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Executive Committee

    Publication Year: 2009 , Page(s): vi
    Save to Project icon | Request Permissions | PDF file iconPDF (51 KB)  
    Freely Available from IEEE
  • Keynote address: Visual tools for security: Is there a there there?

    Publication Year: 2009 , Page(s): viii
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1692 KB)  

    It seems obvious: networks, software, authentication, and people have important and often complicated relationships and interactions. There's far too much going on to keep track of all of it, but we know there are important devils down in the details. We know they are there. Though many have been chasing this dream of security visualization for a couple of decades, we don't have that much to show ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Committee

    Publication Year: 2009 , Page(s): vii
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • Visualization of complex attacks and state of attacked network

    Publication Year: 2009 , Page(s): 1 - 9
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2562 KB) |  | HTML iconHTML  

    This paper deals with the visualization of complex attacks. ¿Complex attacks¿ is used here to denote the type of attack which consists of a sequence of related events, namely a multistep, DDoS attack and alike. While there are numerous systems to visualize events that occur in the network, most of them are too complex to perceive, and require several visualization modes. This work presents a tec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (5 KB)  
    Freely Available from IEEE
  • Over flow: An overview visualization for network analysis

    Publication Year: 2009 , Page(s): 11 - 19
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3132 KB) |  | HTML iconHTML  

    Many network visualizations make the assumption that an administrator has previously determined the subset of data that should be visualized. Yet the problem remains that if the visualization provides no insight into the network events that warrant further consideration, then the administrator must go back to the data to determine what should be visualized next. This is a critical issue given the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (5 KB)  
    Freely Available from IEEE
  • Security visualization tools and IPv6 addresses

    Publication Year: 2009 , Page(s): 21 - 26
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (304 KB) |  | HTML iconHTML  

    Visualization is used by security analysts to help detect patterns and trends in large volumes of network traffic data. With IPv6 slowly being deployed around the world, network intruders are beginning to adapt their tools and techniques to work over IPv6 (vs. IPv4). Many tools for visualizing network activity, while useful for detecting large scale attacks and network behavior anomalies still onl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing compiled executables for malware analysis

    Publication Year: 2009 , Page(s): 27 - 32
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (383 KB) |  | HTML iconHTML  

    Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that represent the overall flow of a program. Most of the steps involve finding interesting areas of an executable and determining their overall functionality. This paper presents a method using dynamic analysis of program execution to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual analysis of malware behavior using treemaps and thread graphs

    Publication Year: 2009 , Page(s): 33 - 38
    Cited by:  Papers (2)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2493 KB) |  | HTML iconHTML  

    We study techniques to visualize the behavior of malicious software (malware). Our aim is to help human analysts to quickly assess and classify the nature of a new malware sample. Our techniques are based on a parametrized abstraction of detailed behavioral reports automatically generated by sandbox environments. We then explore two visualization techniques: treemaps and thread graphs. We argue th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A visual analytic framework for exploring relationships in textual contents of digital forensics evidence

    Publication Year: 2009 , Page(s): 39 - 44
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1557 KB) |  | HTML iconHTML  

    We describe the development of a set of tools for analyzing the textual contents of digital forensic evidence for the purpose of enhancing an investigator's ability to discover information quickly and efficiently. By examining the textual contents of files and unallocated space, relationships between sets of files and clusters can be formed based on the information that they contain. Using the inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing cyber security: Usable workspaces

    Publication Year: 2009 , Page(s): 45 - 56
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (25011 KB) |  | HTML iconHTML  

    The goal of cyber security visualization is to help analysts increase the safety and soundness of our digital infrastructures by providing effective tools and workspaces. Visualization researchers must make visual tools more usable and compelling than the text-based tools that currently dominate cyber analysts' tool chests. A cyber analytics work environment should enable multiple, simultaneous in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualization is better! A comparative evaluation

    Publication Year: 2009 , Page(s): 57 - 68
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1385 KB) |  | HTML iconHTML  

    User testing is an integral component of user-centered design, but has only rarely been applied to visualization for cyber security applications. This paper describes a comparative evaluation of a visualization application and a traditional interface for analyzing network packet captures, that was conducted as part of the user-centered design process. Structured, well-defined tasks and exploratory... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing keyboard pattern passwords

    Publication Year: 2009 , Page(s): 69 - 73
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (259 KB) |  | HTML iconHTML  

    Passwords are a fundamental security vulnerability in many systems. Several researchers have investigated the tradeoff between password memorability versus resiliency to cracking and have looked at alternative systems such as graphical passwords and biometrics. To create stronger passwords, many systems enforce rules regarding the required length and types of characters passwords must contain. Ano... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (5 KB)  
    Freely Available from IEEE
  • Visualizing firewall configurations using created voids

    Publication Year: 2009 , Page(s): 75 - 79
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1297 KB) |  | HTML iconHTML  

    Security configuration files are created and edited as text files. These files are the essential definition and control of the behavior of security devices. Despite their significant size, complexity, and the possibility of interaction between entries, no visually sophisticated tools exist that explicitly capture and visualize problematic interactions between rules to aid in the comprehension and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (5 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2009 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (31 KB)  
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2009 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (2001 KB)  
    Freely Available from IEEE