The Community for Technology Leaders
Visualization for Computer Security, IEEE Workshops on (2005)
Minneapolis, Minnesota
Oct. 26, 2005 to Oct. 26, 2005
ISBN: 0-7803-9477-1
TABLE OF CONTENTS
Cover
Introduction

Preface (PDF)

pp. vii

Committees (PDF)

pp. viii
Session 1

IDS RainStorm: Visualizing IDS Alarms (Abstract)

Kulsoom Abdullah , Georgia Tech
Chris Lee , Georgia Tech
Gregory Conti , Georgia Tech
John A. Copeland , Georgia Tech
John Stasko , Georgia Tech
pp. 1

Visual Correlation of Host Processes and Network Traffic (Abstract)

Glenn A. Fink , Virginia Polytechnic Institute and State University
Paul Muessig , Virginia Polytechnic Institute and State University
Chris North , Virginia Polytechnic Institute and State University
pp. 2

A User-centered Look at Glyph-based Security Visualization (Abstract)

Anita Komlodi , University of Maryland Baltimore County
Penny Rheingans , University of Maryland Baltimore County
Utkarsha Ayachit , University of Maryland Baltimore County
John R. Goodall , University of Maryland Baltimore County
Amit Joshi , University of Maryland Baltimore County
pp. 3

A Visualization Methodology for Characterization of Network Scans (Abstract)

Chris Muelder , University of California, Davis
Kwan-Liu Ma , University of California, Davis
Tony Bartoletti , Lawrence Livermore National Laboratory
pp. 4
Session 2

IDGraphs: Intrusion Detection and Analysis Using Histographs (Abstract)

Pin Ren , Northwestern University
Yan Gao , Northwestern University
Zhichun Li , Northwestern University
Yan Chen , Northwestern University
Benjamin Watson , Northwestern University
pp. 5

Preserving the Big Picture: Visual Network Traffic Analysis with TN (Abstract)

John R. Goodall , University of Maryland, Baltimore County
Wayne G. Lutters , University of Maryland, Baltimore County
Penny Rheingans , University of Maryland, Baltimore County
Anita Komlodi , University of Maryland, Baltimore County
pp. 6

Root Polar Layout of Internet Address Data for Security Administration (Abstract)

Glenn A. Fink , Virginia Polytechnic Institute and State University
Chris North , Virginia Polytechnic Institute and State University
pp. 7

Visualization of Automated Trust Negotiation (Abstract)

Danfeng Yao , Brown University
Michael Shin , Goldman Sachs, Inc.
Roberto Tamassia , Brown University
William H. Winsborough , University of Texas, San Antonio
pp. 8
Session 3

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries (Abstract)

Gregory Conti , Georgia Institute of Technology
Julian Grizzard , Georgia Institute of Technology
Mustaque Ahamad , Georgia Institute of Technology
Henry Owen , Georgia Institute of Technology
pp. 10

Visualizing Cyber Attacks using IP Matrix (Abstract)

Hideki Koike , University of Electro-Communications
Kazuhiro Ohno , University of Electro-Communications
Kanba Koizumi , Keio University
pp. 11

Multiple Coordinated Views for Network Attack Graphs (Abstract)

Steven Noel , George Mason University
Michael Jacobs , George Mason University
Pramod Kalapa , George Mason University
Sushil Jajodia , George Mason University
pp. 12
Session 4

Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned (Abstract)

Anita D'Amico , Secure Decisions, a division of Applied Visions, lnc.
Michael Kocka , Secure Decisions, a division of Applied Visions, lnc.
pp. 13

Exploring Three-dimensional Visualization for Intrusion Detection (Abstract)

Adam Oline , Iowa State University
Dirk Reiners , Iowa State University
pp. 14

Designing Visualization Capabilities for IDS Challenges (Abstract)

Robert F. Erbacher , Utah State University
Kim Christensen , Utah State University
Amanda Sundberg , Utah State University
pp. 15

Visual Firewall: Real-time Network Security Monito (Abstract)

Chris P. Lee , Georgia Tech CSC
Jason Trost , Georgia Tech CS Dept
Nicholas Gibbs , Georgia Tech CS Dept
Raheem Beyah , Georgia Tech CS
John A. Copeland , Georgia Tech CS
pp. 16
90 ms
(Ver 3.3 (11022016))