Logging security incidents is a required security measure in every moderately complex computer system. But while most systems produce large quantities of textual logs, these logs are often neglected or infrequently monitored by untrained personnel. One of the reasons for this neglect is the poor usability offered by distributed repositories of plain text log data, using different log formats and contradictory terminology. The use of security visualization has established itself as a promising research area, aiming to improve the usability of security logs by utilizing the visual perception system's abilities to absorb large data quantities. This thesis examines the state of the art in security log usability, and proposes two ideas to the ar...
Nowadays, data is being generated in large volumes and the users are left with a staggering amount o...
As internet activity and the use of technology increase so does the landscape for vulnerabilities th...
Measuring the security level of an information system to acquire reliable perception of its state re...
International audienceIn this article, we propose ELVIS, a security-oriented log visualization tool ...
Abstract — Today’s growing number of security threats to computers and networks also increase the im...
International audienceIn this article, we present CORGI, a security-oriented log visualization tool ...
We created a pixel map for multivariate data based on an analysis of the needs of network security e...
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially...
The 27th IEEE International Requirements Engineering Conference, Jeju Island, South Korea, 23-27 Sep...
International audienceA growing number of visualization tools are now publicly released on the Web. ...
Network security manager are faced with a rapidly changing and complex threat environment due to the...
This paper will look at the current state of visualization in relation to mainly malware collector l...
This paper will look at the current state of visualization in relation to mainly malware collector l...
Network log files often need to be investigated manually for suspicious activity. The huge amount of...
Audit logs are different from other software logs in that they record the most primitive events (i.e...
Nowadays, data is being generated in large volumes and the users are left with a staggering amount o...
As internet activity and the use of technology increase so does the landscape for vulnerabilities th...
Measuring the security level of an information system to acquire reliable perception of its state re...
International audienceIn this article, we propose ELVIS, a security-oriented log visualization tool ...
Abstract — Today’s growing number of security threats to computers and networks also increase the im...
International audienceIn this article, we present CORGI, a security-oriented log visualization tool ...
We created a pixel map for multivariate data based on an analysis of the needs of network security e...
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially...
The 27th IEEE International Requirements Engineering Conference, Jeju Island, South Korea, 23-27 Sep...
International audienceA growing number of visualization tools are now publicly released on the Web. ...
Network security manager are faced with a rapidly changing and complex threat environment due to the...
This paper will look at the current state of visualization in relation to mainly malware collector l...
This paper will look at the current state of visualization in relation to mainly malware collector l...
Network log files often need to be investigated manually for suspicious activity. The huge amount of...
Audit logs are different from other software logs in that they record the most primitive events (i.e...
Nowadays, data is being generated in large volumes and the users are left with a staggering amount o...
As internet activity and the use of technology increase so does the landscape for vulnerabilities th...
Measuring the security level of an information system to acquire reliable perception of its state re...