Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security 2004
DOI: 10.1145/1029208.1029220
|View full text |Cite
|
Sign up to set email alerts
|

PortVis

Abstract: Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coarsely detailed because of security concerns or other limitations. How can interesting security events still be discovered in data that lacks important details, such as IP addresses, network security alarms, and labels? In this paper, we discuss a system we have designed that takes very coarsely detailed data-basic, summarized information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 146 publications
(7 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Such methods increase the interaction load, cause occlusion, and clutter. In contrast, two-dimensional methods such as PortVis [26] provide an occlusion-free method to identify major events in dynamic networks.…”
Section: Network Analysis and Visualizationsmentioning
confidence: 99%
“…Such methods increase the interaction load, cause occlusion, and clutter. In contrast, two-dimensional methods such as PortVis [26] provide an occlusion-free method to identify major events in dynamic networks.…”
Section: Network Analysis and Visualizationsmentioning
confidence: 99%
“…In network monitoring, Mansmann et al [18] used treemaps to represent the hierarchical characteristics of IP addresses, and users can freely view the hierarchical summary or detailed information through interaction. McPherson et al [19] provided an interactive method of area selection and magnification observation to prevent the interaction of overly dense data points. Considering the different levels of importance of port number sections, less important port numbers were represented by smaller graphical elements.…”
Section: B Network Attack Visualizationmentioning
confidence: 99%
“…The timeline is a visualization of the entire time range available to the system, PortVis, from its data source [3]. The main (hour) visualization depicts the activity during a given time unit [14]. It consists of a 256 x 256 grid in which each dot represents one of the 65,536 ports [3].…”
Section: Portvismentioning
confidence: 99%
“…It consists of a 256 x 256 grid in which each dot represents one of the 65,536 ports [3]. And the port visualization is a view of all the activity and data available that concerns a particular port [3,14]. The histogram corresponds to the relative frequencies of each data value.…”
Section: Portvismentioning
confidence: 99%