4 research outputs found

    Retrospective on a Decade of Research in Visualization for Cybersecurity

    Get PDF
    Over the past decade, the visualization for cybersecurity (VizSec) research community has adapted many information visualization techniques to support the critical work of cyber analysts. While these efforts have yielded many specialized tools and platforms, the community lacks a unified approach to the design and implementation of these systems. In this work, we provide a retrospective analysis of the past decade of VizSec publications, with an eye toward developing a more cohesive understanding of the emerging patterns of design at work in our community. We identify common thematic groupings among existing work, as well as several interesting pat- terns of design around the utilization of various visual encodings. We also discuss existing gaps in the adaptation of information visualization techniques to cybersecurity applications, and recommend avenues for future exploration

    Knowledge-Assisted Rule Building for Malware Analysis 103 -Recent Advances in Multimedia Processing, Organization and Visualization beyond Domains and Disciplines

    Get PDF
    Abstract Due to the increasing threat from malicious software (malware), the monitoring of vulnerable systems is becoming increasingly important, which includes the need to log and analyze activity ranging from networks, individual computers, to mobile devices. Currently available tools in behavior-based malware analysis do not meet all experts' needs, such as selecting different rules, categorizing them by their task and storing them in the database as well as manually adapting and/or tuning the rules identified. To close this gap, we designed CallNet, a knowledge-assisted visual analytics and rulebuilding tool for behavior-based malware analysis. The paper at hand is a design study which describes the design, a usage scenario, and the paper prototype evaluation. We report on the validation of CallNet by expert reviews, reflect on the insights gained from the reviews and, finally discuss the advantages and disadvantages of the prototype design including the visualization techniques applied

    Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis

    No full text
    corecore