Visual analysis of corporate network intelligence: Abstracting and reasoning on yesterdays for acting today

D. Lalanne, E. Bertini, P. Hertzog, P. Bados

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    This article proposes to go beyond the standard visualization application for security management, which is usually day-to-day monitoring. For this purpose, it introduces a pyramidal vision of the network intelligence and of the respective role of information visualization to support not only security engineers, but also analysts and managers. The paper first introduces our holistic vision and discusses the need to reduce the complexity of network data in order to abstract analysis and trends over time and further to convert decisions into actions. The article further introduces the analysis tasks we are currently tackling. The two following sections present two different ways to overview network data concentrating on specific dimensions of network security: user and application centric firstly, and alarm and temporal centric secondly. Finally this article concludes with the limitations and challenges introduced by our approach.

    Original languageEnglish (US)
    Title of host publicationVizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security
    Pages115-130
    Number of pages16
    StatePublished - 2008
    Event4th International Workshop on Computer Security, VizSec 2007 - Sacramento, CA, United States
    Duration: Oct 29 2007Oct 29 2007

    Publication series

    NameVizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security

    Other

    Other4th International Workshop on Computer Security, VizSec 2007
    CountryUnited States
    CitySacramento, CA
    Period10/29/0710/29/07

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Safety, Risk, Reliability and Quality

    Fingerprint Dive into the research topics of 'Visual analysis of corporate network intelligence: Abstracting and reasoning on yesterdays for acting today'. Together they form a unique fingerprint.

  • Cite this

    Lalanne, D., Bertini, E., Hertzog, P., & Bados, P. (2008). Visual analysis of corporate network intelligence: Abstracting and reasoning on yesterdays for acting today. In VizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security (pp. 115-130). (VizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security).