Security visualization: Cyber security storm map and event correlation

Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Chase Wu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Efficient visualization of cyber incidents is the key in securing increasingly complex information infrastructure. Extrapolating security-related information from data from multiple sources can be a daunting task for organizations to maintain safe and secure operating environment. However, meaningful visualizations can significantly improve decision-making quality and help security administrators in taking rapid response. The purpose of this work is to explore this possibility by building on previously gained knowledge and understanding of weather maps used in meteorology, assessing the gaps, and applying various techniques and matrices to quantify the impacts of cyber incidences in an efficient way.

Original languageEnglish (US)
Title of host publicationIEEE SSCI 2011
Subtitle of host publicationSymposium Series on Computational Intelligence - CICS 2011: 2011 IEEE Symposium on Computational Intelligence in Cyber Security
Pages171-178
Number of pages8
DOIs
StatePublished - Aug 11 2011
Externally publishedYes
EventSymposium Series on Computational Intelligence, IEEE SSCI2011 - 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011 - Paris, France
Duration: Apr 11 2011Apr 15 2011

Publication series

NameIEEE SSCI 2011: Symposium Series on Computational Intelligence - CICS 2011: 2011 IEEE Symposium on Computational Intelligence in Cyber Security

Other

OtherSymposium Series on Computational Intelligence, IEEE SSCI2011 - 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011
Country/TerritoryFrance
CityParis
Period4/11/114/15/11

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Security visualization: Cyber security storm map and event correlation'. Together they form a unique fingerprint.

Cite this