Visualization for Cyber Security Conference List of Papers

All Papers from the Annual Visualization For Cyber Security Symposium

Whilst researching novel methods for visualising data from computer security systems the VizSec conference proceedings looked interesting. VizSec is short for Visualization for Cyber Security. This is an annual symposium dedicated to the use of visualisation techniques to help with the complexity of monitoring the large modern systems we all use. System security has become a big data problem and only efficient data analytics will help manage it.

The 11th International Symposium on Visualization for Cyber Security takes place in November 2014. The papers from the previous 10 years of symposiums are available from different institutional or publisher web sites. This means there is not a single search available to get one list of all the papers presented at VizSec over the years. Therefore visits to several web pages and web sites are required to put together the list of all papers presented at VizSec. Since this has now been done that list is published here. Therefore you don’t need to repeat the work.

A note on the spelling of “visualisation” and “visualization”. Both are valid forms. The version with the Z is common in the Americas, the version with the S is common with British speakers. Since this web site is based in the United Kingdom (UK) the latter is used in general text. The conference is organised from the United States hence the spelling of “visualization” in the conference title. The use of “visualization” is more common than “visualisation” when Googling.

List of Papers in the Proceedings of the Annual International Symposium on Visualization for Cyber Security

VizSec 2013, 10th Annual International Symposium on Visualization for Cyber Security

Visualizing PHPIDS Log Files for Better Understanding of Web Server Attacks – Mansour Alsaleh, Abdullah Alqahtani, Abdulrahman Alarifi, Abdulmalik Al-Salman

ELVIS: Extensible Log VISualization – Christopher Humphries, Nicolas Prigent, Frederic Majorczyk, Christophe Bidan

Change-Link 2.0: A Digital Forensic Tool for Visualizing Changes to Shadow Volume Data – Timothy Leschke, Charles Nicholas

CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems – Lisa Dipippo, William Matuszak, Yan Lindsay Sun

Flexible Web Visualization for Alert Based Network Security Analytics – Lihua Hao, Christopher Healey, Steve Hutchinson

NAVSEC: A Recommender System for 3D Network Security Visualizations – Troy Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem Beyah

SRNET: A Real-time, Cross-based Anomaly Detection and Visualization System for Wireless Sensor Networks – Eirini Karapistoli, Panagiotis Sarigiannidis, Anastasios A. Economides

BGPfuse: Using Visual Feature Fusion for the Detection and Attribution of BGP Anomalies – Stavros Papadopoulos, Georgios Theodoridis, Dimitrios Tzovaras

Finding Anomalies in Time-Series using Visual Correlation for Interactive Root Cause Analysis – Florian Stoffel, Fabian Fischer, Daniel Keim

VizSec 2012, 9th Annual International Symposium on Visualization for Cyber Security

Visual Analysis of Complex Firewall Configurations – Florian Mansmann, Timo Göbel, William Cheswick

Automated Tracing and Visualization of Software Security Structure and Properties – Wenbin Fang, Barton P. Miller, James A. Kupsch

Visualization Design for Immediate High-Level Situational Assessment – Robert Erbacher

NV: Nessus Vulnerability Visualization for the Web – Lane Harrison, Riley Spahn, Mike Iannacone, Evan Downing, John R. Goodall

Visualization of Shared System Call Sequence Relationships in Large Malware Corpora – Joshua Saxe, David Mentis, Chris Greamo

MalwareVis: Entity-based Visualization of Malware Network Traces – Wei Zhuo, Yacin Nadji

Change-Link: A Digital Forensic Tool for Visualizing Changes to Directory Trees – Timothy Leschke, Alan Sherman

Visualizing Distributed Memory Computations with Hive Plots – Sophie Engle, Sean Whalen

Visual Spam Campaigns Analysis using Abstract Graphs Representation – Orestis Tsigkas, Olivier Thonnard, Dimitrios Tzovaras

DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System – Daisuke Inoue, Koei Suzuki, Mio Suzuki, Masashi Eto, Koji Nakao

VisTracer: A Visual Analytics Tool to Investigate Routing Anomalies in Traceroutes – Fabian Fischer, Johannes Fuchs, Pierre-Antoine Vervier, Florian Mansmann, Olivier Thonnard

Visualizing Semantics in Passwords: The Role of Dates – Rafael Veras, Julie Thorpe, Christopher Collins

VizSec 2011, 8th Annual International Symposium on Visualization for Cyber Security

TVi: a visual querying system for network monitoring and anomaly detection – Alberto Boschetti, Luca Salgarelli, Chris Muelder, Kwan-Liu Ma

Monitoring large IP spaces with ClockView – Christopher Kintzel, Johannes Fuchs, Florian Mansmann

Supporting the cyber analytic process using visual history on large displays – Ankit Singh, Lauren Bradel, Alex Endert, Robert Kincaid, Christopher Andrews, Chris North

Malware images: visualization and automatic classification – L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath

Visual analysis of goal-directed network defense decisions – Chris Horn, Anita D’Amico

BURN: baring unknown rogue networks – Francesco Roveta, Giorgio Caviglia, Luca Di Mario, Stefano Zanero, Federico Maggi, Paolo Ciuccarelli

VizSec 2010, 7th Annual International Symposium on Visualization for Cyber Security

EMBER: A Global Perspective on Extreme Malicious Behavior – Tamara Yu, Richard Lippmann, James Riordan, Stephen Boyer

Proposing a Multi-touch Interface for Intrusion Detection Environments – Jeffrey Guenther, Fred Volk, Mark Shaneck

Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR –  Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster, Stephen Boyer

Visualizing Graph Dynamics and Similarity for Enterprise Network Security and Management – Qi Liao, Aaron Striegel, Nitesh Chawla

Visual Analysis of Code Security – John R. Goodall, Hassan Radwan, Lenny Halseth

PeekKernelFlows: Peeking into IP flows – Cynthia Wagner, Gerard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel

Visualizing Host Traffic through Graphs – Eduard Glatz

Visualizing Your Key for Secure Phone Calls And Language Independence – Michael Oehler, Dhananjay Phatak, John Krautheim

Traffic Classification Using Visual Motifs: An Empirical Evaluation – Wilson Lian, Fabian Monrose, John McHugh

Real-Time Visualization of Network Behaviors for Situational Awareness – Daniel Best, Shawn Bohn, Douglas Love, Adam Wynne, William Pike

Interactive Detection of Network Anomalies via Coordinated Multiple Views – Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang, Xintao Wu

Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations – Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen, John Patterson

VizSec 2009, 6th Annual International Symposium on Visualization for Cyber Security

Visualization of Complex Attacks and State of Attacked Network – Anatoly Yelizarov, Dennis Gamayunov

OverFlow: An Overview Visualization for Network Analysis – Joel Glanfield, Stephen Brooks, Teryl Taylor, Diana Paterson, Christopher Smith, Carrie Gates, John McHugh

Security Visualization Tools and IPv6 Addresses – David Barrera, P.C. van Oorschot

Visualizing Compiled Executables for Malware Analysis – Daniel A. Quist, Lorie M. Liebrock

Visual Analysis of Malware Behavior Using Treemaps and Thread Graphs – Philipp Trinius, Thorsten Holz, Jan Göbel, Felix C. Freiling

A Visual Analytic Framework for Exploring Relationships in Textual Contents of Digital Forensics Evidence – T.J. Jankun-Kelly, David Wilson, Andrew S. Stamps, Josh Franck, Jeffery Carver, J. Edward Swan II

Visualizing Cyber Security: Usable Workspaces – Glenn A. Fink, Christopher L. North, Alex Endert, Stuart Rose

Visualization is Better! A Comparative Evaluation – John R. Goodall

Visualizing Keyboard Pattern Passwords – Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy

Visualizing Firewall Configurations Using Created Voids – Shaun P. Morrissey, Georges Grinstein

VizSec 2008, 5th Annual International Symposium on Visualization for Cyber Security

Visual Reverse Engineering of Binary and Data Files – Gregory Conti, Erik Dean, Matthew Sinda, Benjamin Sangster

Effective Visualization of File System Access-Control – Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia

Visual Analysis of Program Flow Data with Data Propagation – Ying Xia, Kevin Fairbanks, Henry Owen

A Term Distribution Visualization Approach to Digital Forensic String Search – Moses Schwartz, L.M. Liebrock

GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool
Leevar Williams, Richard Lippmann, Kyle Ingols

A Graph-Theoretic Visualization Approach to Network Risk Analysis – Scott O’Hare, Steven Noel, Kenneth Prole

Improving Attack Graph Visualization through Data Reduction and Attack Grouping – John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen

Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization – T.J. Jankun-Kelly, Josh Franck, David Wilson, Jeffery Carver, David Dampier, J. Edward Swan II

A Task Centered Framework for Computer Security Data Visualization – Xiaoyuan Suo, Ying Zhu, Scott Owen

BGPeep: An IP-Space Centered View for Internet Routing Data – James Shearer, Kwan-Liu Ma, Toby Kohlenberg

Large-Scale Network Monitoring for Visual Analysis of Attacks – Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel

Visualizing Real-Time Network Resource Usage – Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman

Wireless Cyber Assets Discovery Visualization – Kenneth Prole, John R. Goodall, Anita D. D’Amico, Jason K. Kopylec

NetFlow Data Visualization Based on Graphs – Pavel Minarik, Tomas Dymacek

Backhoe, a Packet Trace and Log Browser – Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina

Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis – Jeff Janies

Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts – Shahrulniza Musa, David J. Parish

Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events – Grant Vandenberghe

VizSec 2007, 4th Annual International Symposium on Visualization for Cyber Security

Introduction to Visualization for Computer Security – J.R. Goodall

The Real Work of Computer Network Defense Analysts – A. D’Amico, K. Whitley

Adapting Personas for Use in Security Visualization Design – J. Stoll, D. McColgin, M. Gregory, V. Crow, W.K. Edwards

Measuring the Complexity of Computer Security Visualization Designs – X. Suo, Y. Zhu, G. Scott Owen

Integrated Environment Management for Information Operations Testbeds – T.H. Yu, B.W. Fuller, J.H. Bannick, L.M. Rossey, R.K. Cunningham

Visual Analysis of Network Flow Data with Timelines and Event Plots – D. Phan, J. Gerth, M. Lee, A. Paepcke, T. Winograd

NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior – T. Taylor, S. Brooks, J. McHugh

Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today – D. Lalanne, E. Bertini, P. Hertzog, P. Bados

Visualizing Network Security Events Using Compound Glyphs From a Service-Oriented Perspective – J. Pearlman, P. Rheingans

High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping – B. Irwin, N. Pilkington

VisAlert: From Idea to Product – S. Foresti, J. Agutter

Visually Understanding Jam Resistant Communication – D. Schweitzer, L. Baird, W. Bahn

Visualization of Host Behavior for Network Security – F. Mansman, L. Meier, D.A. Keim

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information – W.A. Pike, C. Scherrer, S. Zabriskie

An Interactive Attack Graph Cascade and Reachability Display – L. Williams, R. Lippmann, K. Ingols

Intelligent Classification and Visualization of Network Scans – C. Muelder, L. Chen, R. Thomason, K.-L. Ma, T. Bartoletti

Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope –
B. Irwin, J.-P. van Riel

VizSec 2006, 3rd Annual International Symposium on Visualization for Cyber Security

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams – S. Mathew, R. Giomundo, S. Upadhyaya, M. Sudit, A. Stotz

Visual toolkit for network security experiment specification and data analysis – L. Li, P. Liu, G. Kesidis

An intelligent, interactive tool for exploration and visualization of time-oriented security data – Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici

Visualizing DNS traffic – Pin Ren, John Kristoff, Bruce Gooch

Real-time collaborative network monitoring and control using 3D game engines for representation and interaction – Warren Harrop, Grenville Armitage

Using visual motifs to classify encrypted traffic – Charles V. Wright, Fabian Monrose, Gerald M. Masson

Visualization assisted detection of sybil attacks in wireless networks – Weichao Wang, Aidong Lu

Tool update: high alarm count issues in IDS rainstorm – Kulsoom Abdullah, John A. Copeland

Tool update: visflowconnect-IP with advanced filtering from usability testing – William Yurcik

Tool update: NVisionIP improvements (difference view, sparklines, and shapes) – William Yurcik

Ensuring the continuing success of VizSec – Pin Ren

VAST: visualizing autonomous system topology – Jon Oberheide, Manish Karir, Dionysus Blazakis

BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies – Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah

Discovering an RC4 anomaly through visualization – Dino Schweitzer, Leemon Baird

Visualizations to improve reactivity towards security incidents inside corporate networks – Patrick Hertzog

Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers – Christopher P. Lee, John A. Copeland

USEable security: interface design strategies for improving security
Amanda L. Stephano, Dennis P. Groth

Visualization for privacy compliance – George Yee

Interactively combining 2D and 3D visualization for network traffic monitoring – Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai

VizSec 2005, 2nd Annual International Symposium on Visualization for Cyber Security

IDS RainStorm: Visualizing IDS Alarms – Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland, John Stasko

Visual Correlation of Host Processes and Network Traffic – Glenn A. Fink, Paul Muessig, Chris North

A User-centered Look at Glyph-based Security Visualization – Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi

A Visualization Methodology for Characterization of Network Scans – Chris Muelder, Kwan-Liu Ma, Tony Bartoletti

IDGraphs: Intrusion Detection and Analysis Using Histographs – Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson

Preserving the Big Picture: Visual Network Traffic Analysis with TNV – John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi

Root Polar Layout of Internet Address Data for Security Administration
Glenn A. Fink, Chris North

Visualization of Automated Trust Negotiation – Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough

Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations – Kiran Lakkaraju, Ratna Bearavolu, Adam Slagell, William Yurcik, Stephen North

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries – Gregory Conti, Julian Grizzard, Mustaque Ahamad, Henry Owen

Visualizing Cyber Attacks Using IP Matrix – Hideki Koike, Kazuhiro Ohno and Kanba Koizumi

Multiple Coordinated Views for Network Attack Graphs – Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia

Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned – Anita D’Amico and Michael Kocka

Exploring Three-dimensional Visualization for Intrusion Detection – Adam Oline, Dirk Reiners

Designing Visualization Capabilities for IDS Challenges – Robert F. Erbacher, Kim Christensen, Amanda Sundberg

Visual Firewall: Real-time Network Security Monitor – Chris P. Lee, Jason Trost, Nicholas Gibbs, Raheem Beyah, John A. Copeland

VizSec 2004, Workshop on Visualization and Data Mining for Computer Security

User re-authentication via mouse movements – Maja Pusara, Carla E. Brodley

HMM profiles for network traffic classification – Charles Wright, Fabian Monrose, Gerald M. Masson

MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences – Gaurav Tandon, Philip Chan, Debasis Mitra

VisFlowConnect: netflow visualizations of link relationships for security situational awareness – Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju

Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP – Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, S. Felix Wu

Passive visual fingerprinting of network attack tools – Gregory Conti, Kulsoom Abdullah

Home-centric visualization of network traffic for security administration – Robert Ball, Glenn A. Fink, Chris North

NVisionIP: netflow visualizations of system state for security situational awareness – Kiran Lakkaraju, William Yurcik, Adam J. Lee

PortVis: a tool for port-based detection of security events – Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen

Visualizing windows executable viruses using self-organizing maps – InSeon Yoo

CyberSeer: 3D audio-visual immersion for network security and management – Christos Papadopoulos, Chris Kyriakakis, Alexander Sawchuk, Xinming He

Combining a bayesian classifier with visualisation: understanding the IDS – Stefan Axelsson

Managing attack graph complexity through visual hierarchical aggregation – Steven Noel, Sushil Jajodia

Scatter (and other) plots for visualizing user profiling data and network traffic – Tom Goldring

Scalable visualization of propagating internet phenomena – Alfonso Valdes, Martin Fong

Email archive analysis through graphical visualization – Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo

NVisionCC: a visualization framework for high performance cluster security – William Yurcik, Xin Meng, Nadir Kiyanclar

Statistical profiling and visualization for detection of malicious insider attacks on computer networks – Jeffrey B. Colombe, Gregory Stephens

SnortView: visualization system of snort logs – Hideki Koike, Kazuhiro Ohno

END OF LIST