2017 IEEE Symposium on Visualization for Cyber Security (VizSec)

2-2 Oct. 2017

Filter Results

Displaying Results 1 - 17 of 17
  • [Title page]

    Publication Year: 2017, Page(s):i - K-1
    Request permission for commercial reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Foreward

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2017, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Keynote

    Publication Year: 2017, Page(s): K-1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (45 KB)

    Summary form only given, as follows. What is the most difficult challenge to using visualization tools to obtain and maintain cyber situational awareness? Is it the data? Analytics? Stale dashboards or displays? Users? My vote is context. Visualization tools often fail to obtain significant adoption or user acceptance because the context obtained at one level of sharing (strategy, operational, tac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CRUMBS: A cyber security framework browser

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1309 KB) | HTML iconHTML

    In the last years, several standards and frameworks have been developed to help organizations to increase the security of their Information Technology (IT) systems. In order to deal with the continuous evolution of the cyberattacks complexity, such solutions have to cope with an overwhelming set of concepts, and are perceived as complex and hard to implement. This paper presents a visual analytics... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expert-interviews led analysis of EEVi — A model for effective visualization in cyber-security

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    The area of visualization in cyber-security is advancing at a fast pace. However, there is a lack of standardized guidelines for designing and evaluating the resulting visualizations. Furthermore, limited end-user involvement in the design process leads to visualizations that are generic and often ineffective for cyber-security analysts. Thus, the adoption of the resultant cyber-security visualiza... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewall ruleset visualization analysis tool based on segmentation

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1703 KB) | HTML iconHTML

    Although most companies operate a firewall to protect their information assets, they have difficulties in identifying the control conditions of firewalls. This study proposes an analysis tool to visualize segment-based firewall rules to facilitate verification of the current control conditions. The proposed visualization tool analyzes the current control conditions of packets automatically, thereb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive visualization toolbox to detect sophisticated android malware

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1543 KB) | HTML iconHTML

    Detecting zero-day sophisticated malware is like searching for a needle in the haystack, not knowing what the needle looks like. This paper describes Android Malicious Flow Visualization Toolbox that empowers a human analyst to detect such malware. Detecting sophisticated malware requires systematic exploration of the code to identify potentially malignant code, conceiving plausible malware hypoth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network-wide intrusion detection supported by multivariate analysis and interactive visualization

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (923 KB) | HTML iconHTML

    In this paper, we introduce a new visualization tool for network-wide intrusion detection. It is based in multivariate anomaly detection with a combination between Principal Component Analysis (PCA) and a new variant called Group-wise PCA (GPCA). Combining these methodologies with the capabilities of interactive visualization, the resulting tool is a highly flexible and intuitive interface that al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1803 KB) | HTML iconHTML

    Malware associated with Web downloads is responsible for many attacks trying to execute malicious code on a remote machine. Web browsers are protected by anti-malware utilities that try to distinguish between good downloads and bad downloads, blocking the bad ones and alerting the user. In order to cope with the uncertainty of such a process, very often the final decision is made using suitable th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a visualization-supported workflow for cyber alert management using threat models and human-centered design

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated decision support in the effort to make their tasks more efficient, accurate, and timely. Support tools come in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards designing effective visualizations for DNS-based network threat analysis

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (945 KB) | HTML iconHTML

    As threat detection systems become critical for protecting modern organizations, visualization has emerged as an essential tool for security analysts to understand network threats. However, there is currently little research in designing and evaluating effective network threat analysis visualizations. To address this problem, we take a user-centered approach, starting with designing an open source... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adversarial-Playground: A visualization suite showing how adversarial examples fool deep learning

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Recent studies have shown that attackers can force deep learning models to misclassify so-called “adversarial examples:” maliciously generated images formed by making imperceptible modifications to pixel values. With growing interest in deep learning for security applications, it is important for security experts and users of machine learning to recognize how learning systems may be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STARLORD: Linked security data exploration in a 3D graph

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    In this paper, we present a novel model and visualization approach for heterogeneous sources of data. We represent our data by using a model inspired by STIX. Then, we use clustering algorithms to select interesting information to explore in a visualization panel. The visualization is based on a 3D graph representation that highlights the link between malicious event and allows to focus on relevan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.