The Community for Technology Leaders
Visualization for Computer Security, IEEE Workshops on (2005)
Minneapolis, Minnesota
Oct. 26, 2005 to Oct. 26, 2005
ISBN: 0-7803-9477-1
TABLE OF CONTENTS
Cover
Introduction

Preface (PDF)

pp. vii

Committees (PDF)

pp. viii
Session 1

IDS RainStorm: Visualizing IDS Alarms (Abstract)

John A. Copeland , Georgia Tech
Gregory Conti , Georgia Tech
Chris Lee , Georgia Tech
John Stasko , Georgia Tech
Kulsoom Abdullah , Georgia Tech
pp. 1

Visual Correlation of Host Processes and Network Traffic (Abstract)

Chris North , Virginia Polytechnic Institute and State University
Paul Muessig , Virginia Polytechnic Institute and State University
Glenn A. Fink , Virginia Polytechnic Institute and State University
pp. 2

A User-centered Look at Glyph-based Security Visualization (Abstract)

Utkarsha Ayachit , University of Maryland Baltimore County
John R. Goodall , University of Maryland Baltimore County
Amit Joshi , University of Maryland Baltimore County
Anita Komlodi , University of Maryland Baltimore County
Penny Rheingans , University of Maryland Baltimore County
pp. 3

A Visualization Methodology for Characterization of Network Scans (Abstract)

Tony Bartoletti , Lawrence Livermore National Laboratory
Kwan-Liu Ma , University of California, Davis
Chris Muelder , University of California, Davis
pp. 4
Session 2

IDGraphs: Intrusion Detection and Analysis Using Histographs (Abstract)

Yan Chen , Northwestern University
Zhichun Li , Northwestern University
Pin Ren , Northwestern University
Yan Gao , Northwestern University
Benjamin Watson , Northwestern University
pp. 5

Preserving the Big Picture: Visual Network Traffic Analysis with TN (Abstract)

John R. Goodall , University of Maryland, Baltimore County
Wayne G. Lutters , University of Maryland, Baltimore County
Penny Rheingans , University of Maryland, Baltimore County
Anita Komlodi , University of Maryland, Baltimore County
pp. 6

Root Polar Layout of Internet Address Data for Security Administration (Abstract)

Glenn A. Fink , Virginia Polytechnic Institute and State University
Chris North , Virginia Polytechnic Institute and State University
pp. 7

Visualization of Automated Trust Negotiation (Abstract)

William H. Winsborough , University of Texas, San Antonio
Danfeng Yao , Brown University
Michael Shin , Goldman Sachs, Inc.
Roberto Tamassia , Brown University
pp. 8
Session 3

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries (Abstract)

Henry Owen , Georgia Institute of Technology
Gregory Conti , Georgia Institute of Technology
Julian Grizzard , Georgia Institute of Technology
Mustaque Ahamad , Georgia Institute of Technology
pp. 10

Visualizing Cyber Attacks using IP Matrix (Abstract)

Hideki Koike , University of Electro-Communications
Kanba Koizumi , Keio University
Kazuhiro Ohno , University of Electro-Communications
pp. 11

Multiple Coordinated Views for Network Attack Graphs (Abstract)

Michael Jacobs , George Mason University
Sushil Jajodia , George Mason University
Pramod Kalapa , George Mason University
Steven Noel , George Mason University
pp. 12
Session 4

Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned (Abstract)

Anita D'Amico , Secure Decisions, a division of Applied Visions, lnc.
Michael Kocka , Secure Decisions, a division of Applied Visions, lnc.
pp. 13

Exploring Three-dimensional Visualization for Intrusion Detection (Abstract)

Adam Oline , Iowa State University
Dirk Reiners , Iowa State University
pp. 14

Designing Visualization Capabilities for IDS Challenges (Abstract)

Kim Christensen , Utah State University
Amanda Sundberg , Utah State University
Robert F. Erbacher , Utah State University
pp. 15

Visual Firewall: Real-time Network Security Monito (Abstract)

Nicholas Gibbs , Georgia Tech CS Dept
John A. Copeland , Georgia Tech CS
Raheem Beyah , Georgia Tech CS
Jason Trost , Georgia Tech CS Dept
Chris P. Lee , Georgia Tech CSC
pp. 16
96 ms
(Ver )