“…A wide variety of visual displays and graphical interfaces have been developed for CND in pursuit of this goal. Graph-based approaches have been used to visualize various relationships between network hosts including radial graph displays for system events (e.g., multisource system logs; Zhao, Zhou, & Shi, 2012), 3D visualizations for monitoring Darknet traffic (Inoue, Eto, Suzuki, Suzuki, & Nakao, 2012), network attack information (Tamassia, Palazzi, & Papamanthou, 2009), and overviews of network activity (Oline & Reiners, 2005). Bobche and Mehtre (2014) developed visual representations of exploitation patterns.…”