D 2017

Visual Analytics for Network Security and Critical Infrastructures

BURSKÁ, Karolína and Radek OŠLEJŠEK

Basic information

Original name

Visual Analytics for Network Security and Critical Infrastructures

Authors

BURSKÁ, Karolína (203 Czech Republic, belonging to the institution) and Radek OŠLEJŠEK (203 Czech Republic, belonging to the institution)

Edition

Zürich (Switzerland), AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, p. 149-152, 4 pp. 2017

Publisher

Springer

Other information

Language

English

Type of outcome

Proceedings paper

Field of Study

Informatics

Country of publisher

Switzerland

Confidentiality degree

is not subject to a state or trade secret

Publication form

printed version "print"

References:

RIV identification code

RIV/00216224:14330/17:00094477

Organization

Fakulta informatiky – Repository – Repository

ISBN

978-3-319-60773-3

ISSN

EID Scopus

2-s2.0-85025143322

Keywords in English

Visual analytics; Network security; Knowledge generation

Links

MUNI/A/0997/2016, interní kód Repo. VI20162019014, research and development project.
Changed: 4/9/2020 07:30, RNDr. Daniel Jakubík

Abstract

V originále

A comprehensive analysis of cyber attacks is important for better understanding of their nature and their origin. Providing a sufficient insight into such a vast amount of diverse (and sometimes seemingly unrelated) data is a task that is suitable neither for humans nor for fully automated algorithms alone. Not only a combination of the two approaches but also a continuous reasoning process that is capable of generating a sufficient knowledge base is indispensable for a better understanding of the events. Our research is focused on designing new exploratory methods and interactive visualizations in the context of network security. The knowledge generation loop is important for its ability to help analysts to refine the nature of the processes that continuously occur and to offer them a better insight into the network security related events. In this paper, we formulate the research questions that relate to the proposed solution.

Files attached