The analysis and exploration of emerging threats in the Internet is important to better understand the behaviour of attackers and develop new methods to enhance cyber security. Fully automated algorithms alone are often not capable of providing actionable insights about the threat landscape. We therefore combine a multi-criteria clus-tering algorithm, tailor-made for the identification of such attack campaigns with three interactive visualizations, namely treemap representations, interactive node-link diagrams, and chord diagrams, to allow the analysts to visually explore and make sense of the resulting multi-dimensional clusters. To demonstrate the potential of the system, we share our lessons learned in conducting a field experiment with ...
In this thesis we study the possibility of applying visualization and visual analytics in the contex...
This paper describes a web-based visualization system de-signed for network security analysts at the...
A comprehensive analysis of cyber attacks is important for better understanding of their nature and ...
The analysis and exploration of emerging threats in the Internet is important to better understand t...
The analysis and exploration of emerging threats in the Internet is important to better understand t...
More than ever, we rely on computer systems and the availability of computer networks. It is crucial...
The amount of cyberattacks in Germany increased over the last years but many small and medium-sized ...
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in c...
Effective visual analysis of computer network defense (CND) information is challenging due to the vo...
Visualization of network security events has become an important method for detecting, responding to...
Cyber security threat detection is the process of identifying anomalous and frequent patterns within...
Manual analysis of security-related events is still a necessity to investigate non-trivial cyber att...
As a model of vulnerability information, attack graphs have seen successes in many automated analyse...
Network Intrusion Detection System (NIDS) is a security system that monitors the network traffic and...
Securing the highly complex infrastructures of modern organizations against innovative and targeted ...
In this thesis we study the possibility of applying visualization and visual analytics in the contex...
This paper describes a web-based visualization system de-signed for network security analysts at the...
A comprehensive analysis of cyber attacks is important for better understanding of their nature and ...
The analysis and exploration of emerging threats in the Internet is important to better understand t...
The analysis and exploration of emerging threats in the Internet is important to better understand t...
More than ever, we rely on computer systems and the availability of computer networks. It is crucial...
The amount of cyberattacks in Germany increased over the last years but many small and medium-sized ...
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in c...
Effective visual analysis of computer network defense (CND) information is challenging due to the vo...
Visualization of network security events has become an important method for detecting, responding to...
Cyber security threat detection is the process of identifying anomalous and frequent patterns within...
Manual analysis of security-related events is still a necessity to investigate non-trivial cyber att...
As a model of vulnerability information, attack graphs have seen successes in many automated analyse...
Network Intrusion Detection System (NIDS) is a security system that monitors the network traffic and...
Securing the highly complex infrastructures of modern organizations against innovative and targeted ...
In this thesis we study the possibility of applying visualization and visual analytics in the contex...
This paper describes a web-based visualization system de-signed for network security analysts at the...
A comprehensive analysis of cyber attacks is important for better understanding of their nature and ...