ZHONG Zengsheng, ZHAO Ying, SHI Ronghua, SHENG Yingshuai, LIU Junrong, MENG Hua, LIN Dan. A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security[J]. Chinese Journal of Electronics, 2018, 27(5): 910-919. doi: 10.1049/cje.2017.09.021
Citation: ZHONG Zengsheng, ZHAO Ying, SHI Ronghua, SHENG Yingshuai, LIU Junrong, MENG Hua, LIN Dan. A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security[J]. Chinese Journal of Electronics, 2018, 27(5): 910-919. doi: 10.1049/cje.2017.09.021

A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security

doi: 10.1049/cje.2017.09.021
Funds:  This work is supported by the National Natural Science Foundation of China (No.61402540, No.61672538) and the Natural Science Foundation of Hunan Province (No.2017JJ3414).
More Information
  • Corresponding author: ZHAO Ying (corresponding author) is an associate professor in the School of Information Science and Engineering at Central South University. His research interests include visual analytics and information security. Zhao has a Ph.D. in computer science and technology from Central South University. (Email:zhaoying@csu.edu.cn)
  • Received Date: 2017-03-06
  • Rev Recd Date: 2017-06-18
  • Publish Date: 2018-09-10
  • Based on a university's practice in upgrading its network management platform, presents a visual analytic system which integrates network topological space, IP space and network geographical space into a collaborative solution to help network administrators address difficulties in locating end user and troubleshooting. Throughout the development cycle, we worked alongside with users to clarify their actual demands and habitual operations through scenario application, interviews and a variety of evaluation. This user-centered approach guides us step by step to apply cyber security visualization and visual analytic technology to actual use.
  • loading
  • Shiravi, H, A. Shiravi and A. A. Ghorbani, “A survey of visualization systems for network security”, IEEE Transactions on Visualization & Computer Graphics, Vol.18, No.8, pp.1313-1329.
    Zhao Ying, Fan Xiaoping, Zhou Fangfang, et al., “A survey on network security data visualization”, Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, Vol.26, No.5, pp.687-697, 2014. (in Chinese)
    Diane Staheli, Tamara Yu, R. Jordan Crouser, et al., “Visualization evaluation for cyber security: Trends and future directions”, Eleventh Workshop on Visualization for Cyber Security ACM, Paris, France, pp.49-56, 2014.
    Mckenna Sean, D. Staheli and M. Meyer, “Unlocking usercentered design methods for building cyber security visualizations”, Visualization for Cyber Security IEEE, Chicago, Illinois, USA, pp.1-8, 2015.
    Greenberg, Saul and B. Buxton, “Usability evaluation considered harmful (some of the time)”, Sigchi Conference on Human Factors in Computing Systems ACM, Florence, Italy, pp.111-120, 2008
    Tobias Isenberg, Petra Isenberg and Jian Chen, “A systematic review on the practice of evaluating visualization”, IEEE Transactions on Visualization & Computer Graphics, Vol.19, No.12, pp.2818-2827, 2013.
    Plaisant Catherine, “The challenge of information visualization evaluation”, Working Conference on Advanced Visual Interfaces ACM, Gallipoli, Italy, pp.109-116, 2004.
    Zhang Yanping, Xiao Yang, Chen Min, et al., “A survey of security visualization for computer network logs”, Security & Communication Networks, Vol.5, No.4, pp.404-421, 2012.
    Koike Hideki, K. Ohno and K. Koizumi, “Visualizing cyber attacks using IP matrix”, IEEE Workshops on Visualization for Computer Security IEEE Computer Society, Minneapolis, Minnesota, USA, pp.91-98, 2005.
    Zhou Fangfang, Huang Wei and Zhao Ying, “ENTVis: A visual analytic tool for entropy-based network traffic anomaly detection”, IEEE Computer Graphics and Applications, Vol.35, No.6, pp.42-50, 2015.
    Kohara, Masayoshi, Y. Hori, and K. Sakurai, “Interactively combining 2D and 3D visualization for network traffic monitoring”, International Workshop on Visualization for Computer Security ACM, Alexandria, Virginia, USA, pp.123-127, 2006.
    Mansmann Florian, Rexroad Brain, C. North Stephen, et al., “Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats”, IEEE Transactions on Visualization & Computer Graphics, Vol.13, No.6, pp.1105-1112, 2007.
    Fabian Fischer, Johannes Fuchs, Florian Mansmann, et al., “BANKSAFE: Visual analytics for big data in large-scale computer networks”, Information Visualization, Vol.14, No.1, pp.51-61, 2015.
    Zhao Ying, Liang Xing, Fan Xiaoping, et al., “MVSec: Multiperspective and deductive visual analytics on heterogeneous network security data”, Journal of Visualization, Vol.17, No.3, pp.181-196, 2014.
    Q. Liao, L. Shi and C. Wang, “Visual analysis of large-scale network anomalies”, IBM Journal of Research and Development, Vol.57, No.3/4, pp.13:1-13:2, 2013.
    Priya Mahadevan, Dmitri Krioukov, Kevin Fall, et al., “Systematic topology analysis and generation using degree correlations”, In SIGCOMM, Pisa, Italy, Vol.36, No.4, pp.135-146, 2006.
    Lei Shi, Qi Liao and Yuan He, “SAVE: Sensor anomaly visualization engine”, Visual Analytics Science and Technology IEEE, Providence, Rhode Island, USA, pp.201—210, 2011.
    Gray Cameron C., P. D. Ritsos and J. C. Robertsz, “Contextual network navigation to provide situational awareness for network administrators”, Visualization for Cyber Security IEEE, Chicago, Illinois, USA, pp.1-8, 2015.
    Dustin L. Arendt, Russ Burtner, Daniel M., et al., “Ocelot: User-centered design of a decision support visualization for network quarantine”, Visualization for Cyber Security (VizSec), 2015 IEEE Symposium, Chicago, Illinois, USA, pp.1-8, 2015.
    Shelly David, Dunlop Matthew, Marchany Randy, et al., “Using geographic information systems for enhanced network security visualization”, International Conference and Exhibition on Computing for Geospatial Research & Application, Com.geo 2010, Washington, DC, USA, pp.1-8, 2010.
    Fowler J. Joseph, Johnson Thienne, Simonetto Paolo, et al., “IMap: Visualizing network activity over internet maps”, Eleventh Workshop on Visualization for Cyber Security ACM, Paris, France, pp.80-87, 2014.
    Cook K, Grinstein G and Whiting M, “The VAST Challenge: History, scope, and outcomes: An introduction to the special issue”, Information Visualization, Vol.13, No.4, pp.301-312, 2014.
    Shi Ronghua, Yang Mengjie, Zhao Ying, et al., “A matrix-based visualization system for network traffic forensics”, IEEE Systems Journal, Vol.10, No.4, pp.1350-1360, 2016.
    Zhao Ying, Zhou Fangfang, Fan Xiaoping, et al., “IDSRadar: A real-time visualization framework for IDS alerts”, Science China, Vol.56, No.8, pp.1-12, 2013.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (196) PDF downloads(300) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return