Abstract:
Network security is critical for organizations to secure their network resources from intrusion and attacks. A security policy is a rule enforced in the network to allow ...Show MoreMetadata
Abstract:
Network security is critical for organizations to secure their network resources from intrusion and attacks. A security policy is a rule enforced in the network to allow or block network traffic. To write security policies, network analysts divide their networks into segments or parts with similar security needs. Segmentation makes writing security policies manageable and identifies robust security policies for the network. Visualizations can help analysts to understand the segmented network and define security policies. We contribute Portola, a hybrid tree and network visualization technique to display a segmented computer network. Portola presents an overview of the segmentation as a hierarchy and displays connections within the network. Using Portola, analysts can explore a segmented network, identify nodes and connections of interest through exploratory network analysis, and drill down on elements of interest to reason about the patterns of relationships in the network. Through this work, we also discuss the goals of network analysts who work with segmented networks and discuss the lessons learned from the user-centered iterative design of Portola.
Date of Conference: 19-19 October 2022
Date Added to IEEE Xplore: 10 November 2022
ISBN Information:
ISSN Information:
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Visual Network ,
- Hybrid Network ,
- Tree Visualization ,
- Hybrid Trees ,
- Exploratory Analysis ,
- Digital Networks ,
- Security Policy ,
- User-centered ,
- Iterative Design ,
- Part Of Network ,
- Network Characteristics ,
- Traffic Flow ,
- Domain Experts ,
- Levels Of Hierarchy ,
- Final Design ,
- Node Positions ,
- Leaf Node ,
- Source Node ,
- Hierarchical Features ,
- Target Node ,
- Overview Of Networks ,
- Node Selection ,
- Hierarchical Data ,
- Items Of Interest ,
- Core Services ,
- Use Case Scenarios ,
- Visual Clutter ,
- Visual Design ,
- Network Flow
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Visual Network ,
- Hybrid Network ,
- Tree Visualization ,
- Hybrid Trees ,
- Exploratory Analysis ,
- Digital Networks ,
- Security Policy ,
- User-centered ,
- Iterative Design ,
- Part Of Network ,
- Network Characteristics ,
- Traffic Flow ,
- Domain Experts ,
- Levels Of Hierarchy ,
- Final Design ,
- Node Positions ,
- Leaf Node ,
- Source Node ,
- Hierarchical Features ,
- Target Node ,
- Overview Of Networks ,
- Node Selection ,
- Hierarchical Data ,
- Items Of Interest ,
- Core Services ,
- Use Case Scenarios ,
- Visual Clutter ,
- Visual Design ,
- Network Flow
- Author Keywords