All Papers from the Annual Visualization For Cyber Security Symposium
Whilst researching novel methods for visualising data from computer security systems the VizSec conference proceedings looked interesting. VizSec is short for Visualization for Cyber Security. This is an annual symposium dedicated to the use of visualisation techniques to help with the complexity of monitoring the large modern systems we all use. System security has become a big data problem and only efficient data analytics will help manage it.
The 11th International Symposium on Visualization for Cyber Security takes place in November 2014. The papers from the previous 10 years of symposiums are available from different institutional or publisher web sites. This means there is not a single search available to get one list of all the papers presented at VizSec over the years. Therefore visits to several web pages and web sites are required to put together the list of all papers presented at VizSec. Since this has now been done that list is published here. Therefore you don’t need to repeat the work.
A note on the spelling of “visualisation” and “visualization”. Both are valid forms. The version with the Z is common in the Americas, the version with the S is common with British speakers. Since this web site is based in the United Kingdom (UK) the latter is used in general text. The conference is organised from the United States hence the spelling of “visualization” in the conference title. The use of “visualization” is more common than “visualisation” when Googling.
List of Papers in the Proceedings of the Annual International Symposium on Visualization for Cyber Security
VizSec 2013, 10th Annual International Symposium on Visualization for Cyber Security
Visualizing PHPIDS Log Files for Better Understanding of Web Server Attacks – Mansour Alsaleh, Abdullah Alqahtani, Abdulrahman Alarifi, Abdulmalik Al-Salman
ELVIS: Extensible Log VISualization – Christopher Humphries, Nicolas Prigent, Frederic Majorczyk, Christophe Bidan
Change-Link 2.0: A Digital Forensic Tool for Visualizing Changes to Shadow Volume Data – Timothy Leschke, Charles Nicholas
CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems – Lisa Dipippo, William Matuszak, Yan Lindsay Sun
Flexible Web Visualization for Alert Based Network Security Analytics – Lihua Hao, Christopher Healey, Steve Hutchinson
NAVSEC: A Recommender System for 3D Network Security Visualizations – Troy Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem Beyah
SRNET: A Real-time, Cross-based Anomaly Detection and Visualization System for Wireless Sensor Networks – Eirini Karapistoli, Panagiotis Sarigiannidis, Anastasios A. Economides
BGPfuse: Using Visual Feature Fusion for the Detection and Attribution of BGP Anomalies – Stavros Papadopoulos, Georgios Theodoridis, Dimitrios Tzovaras
Finding Anomalies in Time-Series using Visual Correlation for Interactive Root Cause Analysis – Florian Stoffel, Fabian Fischer, Daniel Keim
VizSec 2012, 9th Annual International Symposium on Visualization for Cyber Security
Visual Analysis of Complex Firewall Configurations – Florian Mansmann, Timo Göbel, William Cheswick
Automated Tracing and Visualization of Software Security Structure and Properties – Wenbin Fang, Barton P. Miller, James A. Kupsch
Visualization Design for Immediate High-Level Situational Assessment – Robert Erbacher
NV: Nessus Vulnerability Visualization for the Web – Lane Harrison, Riley Spahn, Mike Iannacone, Evan Downing, John R. Goodall
Visualization of Shared System Call Sequence Relationships in Large Malware Corpora – Joshua Saxe, David Mentis, Chris Greamo
MalwareVis: Entity-based Visualization of Malware Network Traces – Wei Zhuo, Yacin Nadji
Change-Link: A Digital Forensic Tool for Visualizing Changes to Directory Trees – Timothy Leschke, Alan Sherman
Visualizing Distributed Memory Computations with Hive Plots – Sophie Engle, Sean Whalen
Visual Spam Campaigns Analysis using Abstract Graphs Representation – Orestis Tsigkas, Olivier Thonnard, Dimitrios Tzovaras
DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System – Daisuke Inoue, Koei Suzuki, Mio Suzuki, Masashi Eto, Koji Nakao
VisTracer: A Visual Analytics Tool to Investigate Routing Anomalies in Traceroutes – Fabian Fischer, Johannes Fuchs, Pierre-Antoine Vervier, Florian Mansmann, Olivier Thonnard
Visualizing Semantics in Passwords: The Role of Dates – Rafael Veras, Julie Thorpe, Christopher Collins
VizSec 2011, 8th Annual International Symposium on Visualization for Cyber Security
TVi: a visual querying system for network monitoring and anomaly detection – Alberto Boschetti, Luca Salgarelli, Chris Muelder, Kwan-Liu Ma
Monitoring large IP spaces with ClockView – Christopher Kintzel, Johannes Fuchs, Florian Mansmann
Supporting the cyber analytic process using visual history on large displays – Ankit Singh, Lauren Bradel, Alex Endert, Robert Kincaid, Christopher Andrews, Chris North
Malware images: visualization and automatic classification – L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath
Visual analysis of goal-directed network defense decisions – Chris Horn, Anita D’Amico
BURN: baring unknown rogue networks – Francesco Roveta, Giorgio Caviglia, Luca Di Mario, Stefano Zanero, Federico Maggi, Paolo Ciuccarelli
VizSec 2010, 7th Annual International Symposium on Visualization for Cyber Security
EMBER: A Global Perspective on Extreme Malicious Behavior – Tamara Yu, Richard Lippmann, James Riordan, Stephen Boyer
Proposing a Multi-touch Interface for Intrusion Detection Environments – Jeffrey Guenther, Fred Volk, Mark Shaneck
Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR – Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster, Stephen Boyer
Visualizing Graph Dynamics and Similarity for Enterprise Network Security and Management – Qi Liao, Aaron Striegel, Nitesh Chawla
Visual Analysis of Code Security – John R. Goodall, Hassan Radwan, Lenny Halseth
PeekKernelFlows: Peeking into IP flows – Cynthia Wagner, Gerard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel
Visualizing Host Traffic through Graphs – Eduard Glatz
Visualizing Your Key for Secure Phone Calls And Language Independence – Michael Oehler, Dhananjay Phatak, John Krautheim
Traffic Classification Using Visual Motifs: An Empirical Evaluation – Wilson Lian, Fabian Monrose, John McHugh
Real-Time Visualization of Network Behaviors for Situational Awareness – Daniel Best, Shawn Bohn, Douglas Love, Adam Wynne, William Pike
Interactive Detection of Network Anomalies via Coordinated Multiple Views – Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang, Xintao Wu
Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations – Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen, John Patterson
VizSec 2009, 6th Annual International Symposium on Visualization for Cyber Security
Visualization of Complex Attacks and State of Attacked Network – Anatoly Yelizarov, Dennis Gamayunov
OverFlow: An Overview Visualization for Network Analysis – Joel Glanfield, Stephen Brooks, Teryl Taylor, Diana Paterson, Christopher Smith, Carrie Gates, John McHugh
Security Visualization Tools and IPv6 Addresses – David Barrera, P.C. van Oorschot
Visualizing Compiled Executables for Malware Analysis – Daniel A. Quist, Lorie M. Liebrock
Visual Analysis of Malware Behavior Using Treemaps and Thread Graphs – Philipp Trinius, Thorsten Holz, Jan Göbel, Felix C. Freiling
A Visual Analytic Framework for Exploring Relationships in Textual Contents of Digital Forensics Evidence – T.J. Jankun-Kelly, David Wilson, Andrew S. Stamps, Josh Franck, Jeffery Carver, J. Edward Swan II
Visualizing Cyber Security: Usable Workspaces – Glenn A. Fink, Christopher L. North, Alex Endert, Stuart Rose
Visualization is Better! A Comparative Evaluation – John R. Goodall
Visualizing Keyboard Pattern Passwords – Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy
Visualizing Firewall Configurations Using Created Voids – Shaun P. Morrissey, Georges Grinstein
VizSec 2008, 5th Annual International Symposium on Visualization for Cyber Security
Visual Reverse Engineering of Binary and Data Files – Gregory Conti, Erik Dean, Matthew Sinda, Benjamin Sangster
Effective Visualization of File System Access-Control – Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia
Visual Analysis of Program Flow Data with Data Propagation – Ying Xia, Kevin Fairbanks, Henry Owen
A Term Distribution Visualization Approach to Digital Forensic String Search – Moses Schwartz, L.M. Liebrock
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool –
Leevar Williams, Richard Lippmann, Kyle Ingols
A Graph-Theoretic Visualization Approach to Network Risk Analysis – Scott O’Hare, Steven Noel, Kenneth Prole
Improving Attack Graph Visualization through Data Reduction and Attack Grouping – John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen
Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization – T.J. Jankun-Kelly, Josh Franck, David Wilson, Jeffery Carver, David Dampier, J. Edward Swan II
A Task Centered Framework for Computer Security Data Visualization – Xiaoyuan Suo, Ying Zhu, Scott Owen
BGPeep: An IP-Space Centered View for Internet Routing Data – James Shearer, Kwan-Liu Ma, Toby Kohlenberg
Large-Scale Network Monitoring for Visual Analysis of Attacks – Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel
Visualizing Real-Time Network Resource Usage – Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman
Wireless Cyber Assets Discovery Visualization – Kenneth Prole, John R. Goodall, Anita D. D’Amico, Jason K. Kopylec
NetFlow Data Visualization Based on Graphs – Pavel Minarik, Tomas Dymacek
Backhoe, a Packet Trace and Log Browser – Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina
Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis – Jeff Janies
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts – Shahrulniza Musa, David J. Parish
Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events – Grant Vandenberghe
VizSec 2007, 4th Annual International Symposium on Visualization for Cyber Security
Introduction to Visualization for Computer Security – J.R. Goodall
The Real Work of Computer Network Defense Analysts – A. D’Amico, K. Whitley
Adapting Personas for Use in Security Visualization Design – J. Stoll, D. McColgin, M. Gregory, V. Crow, W.K. Edwards
Measuring the Complexity of Computer Security Visualization Designs – X. Suo, Y. Zhu, G. Scott Owen
Integrated Environment Management for Information Operations Testbeds – T.H. Yu, B.W. Fuller, J.H. Bannick, L.M. Rossey, R.K. Cunningham
Visual Analysis of Network Flow Data with Timelines and Event Plots – D. Phan, J. Gerth, M. Lee, A. Paepcke, T. Winograd
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior – T. Taylor, S. Brooks, J. McHugh
Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today – D. Lalanne, E. Bertini, P. Hertzog, P. Bados
Visualizing Network Security Events Using Compound Glyphs From a Service-Oriented Perspective – J. Pearlman, P. Rheingans
High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping – B. Irwin, N. Pilkington
VisAlert: From Idea to Product – S. Foresti, J. Agutter
Visually Understanding Jam Resistant Communication – D. Schweitzer, L. Baird, W. Bahn
Visualization of Host Behavior for Network Security – F. Mansman, L. Meier, D.A. Keim
Putting Security in Context: Visual Correlation of Network Activity with Real-World Information – W.A. Pike, C. Scherrer, S. Zabriskie
An Interactive Attack Graph Cascade and Reachability Display – L. Williams, R. Lippmann, K. Ingols
Intelligent Classification and Visualization of Network Scans – C. Muelder, L. Chen, R. Thomason, K.-L. Ma, T. Bartoletti
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope –
B. Irwin, J.-P. van Riel
VizSec 2006, 3rd Annual International Symposium on Visualization for Cyber Security
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams – S. Mathew, R. Giomundo, S. Upadhyaya, M. Sudit, A. Stotz
Visual toolkit for network security experiment specification and data analysis – L. Li, P. Liu, G. Kesidis
An intelligent, interactive tool for exploration and visualization of time-oriented security data – Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici
Visualizing DNS traffic – Pin Ren, John Kristoff, Bruce Gooch
Real-time collaborative network monitoring and control using 3D game engines for representation and interaction – Warren Harrop, Grenville Armitage
Using visual motifs to classify encrypted traffic – Charles V. Wright, Fabian Monrose, Gerald M. Masson
Visualization assisted detection of sybil attacks in wireless networks – Weichao Wang, Aidong Lu
Tool update: high alarm count issues in IDS rainstorm – Kulsoom Abdullah, John A. Copeland
Tool update: visflowconnect-IP with advanced filtering from usability testing – William Yurcik
Tool update: NVisionIP improvements (difference view, sparklines, and shapes) – William Yurcik
Ensuring the continuing success of VizSec – Pin Ren
VAST: visualizing autonomous system topology – Jon Oberheide, Manish Karir, Dionysus Blazakis
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies – Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah
Discovering an RC4 anomaly through visualization – Dino Schweitzer, Leemon Baird
Visualizations to improve reactivity towards security incidents inside corporate networks – Patrick Hertzog
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers – Christopher P. Lee, John A. Copeland
USEable security: interface design strategies for improving security –
Amanda L. Stephano, Dennis P. Groth
Visualization for privacy compliance – George Yee
Interactively combining 2D and 3D visualization for network traffic monitoring – Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai
VizSec 2005, 2nd Annual International Symposium on Visualization for Cyber Security
IDS RainStorm: Visualizing IDS Alarms – Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland, John Stasko
Visual Correlation of Host Processes and Network Traffic – Glenn A. Fink, Paul Muessig, Chris North
A User-centered Look at Glyph-based Security Visualization – Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi
A Visualization Methodology for Characterization of Network Scans – Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
IDGraphs: Intrusion Detection and Analysis Using Histographs – Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson
Preserving the Big Picture: Visual Network Traffic Analysis with TNV – John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi
Root Polar Layout of Internet Address Data for Security Administration –
Glenn A. Fink, Chris North
Visualization of Automated Trust Negotiation – Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations – Kiran Lakkaraju, Ratna Bearavolu, Adam Slagell, William Yurcik, Stephen North
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries – Gregory Conti, Julian Grizzard, Mustaque Ahamad, Henry Owen
Visualizing Cyber Attacks Using IP Matrix – Hideki Koike, Kazuhiro Ohno and Kanba Koizumi
Multiple Coordinated Views for Network Attack Graphs – Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned – Anita D’Amico and Michael Kocka
Exploring Three-dimensional Visualization for Intrusion Detection – Adam Oline, Dirk Reiners
Designing Visualization Capabilities for IDS Challenges – Robert F. Erbacher, Kim Christensen, Amanda Sundberg
Visual Firewall: Real-time Network Security Monitor – Chris P. Lee, Jason Trost, Nicholas Gibbs, Raheem Beyah, John A. Copeland
VizSec 2004, Workshop on Visualization and Data Mining for Computer Security
User re-authentication via mouse movements – Maja Pusara, Carla E. Brodley
HMM profiles for network traffic classification – Charles Wright, Fabian Monrose, Gerald M. Masson
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences – Gaurav Tandon, Philip Chan, Debasis Mitra
VisFlowConnect: netflow visualizations of link relationships for security situational awareness – Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP – Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, S. Felix Wu
Passive visual fingerprinting of network attack tools – Gregory Conti, Kulsoom Abdullah
Home-centric visualization of network traffic for security administration – Robert Ball, Glenn A. Fink, Chris North
NVisionIP: netflow visualizations of system state for security situational awareness – Kiran Lakkaraju, William Yurcik, Adam J. Lee
PortVis: a tool for port-based detection of security events – Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen
Visualizing windows executable viruses using self-organizing maps – InSeon Yoo
CyberSeer: 3D audio-visual immersion for network security and management – Christos Papadopoulos, Chris Kyriakakis, Alexander Sawchuk, Xinming He
Combining a bayesian classifier with visualisation: understanding the IDS – Stefan Axelsson
Managing attack graph complexity through visual hierarchical aggregation – Steven Noel, Sushil Jajodia
Scatter (and other) plots for visualizing user profiling data and network traffic – Tom Goldring
Scalable visualization of propagating internet phenomena – Alfonso Valdes, Martin Fong
Email archive analysis through graphical visualization – Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
NVisionCC: a visualization framework for high performance cluster security – William Yurcik, Xin Meng, Nadir Kiyanclar
Statistical profiling and visualization for detection of malicious insider attacks on computer networks – Jeffrey B. Colombe, Gregory Stephens
SnortView: visualization system of snort logs – Hideki Koike, Kazuhiro Ohno
END OF LIST