Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.We used the (Fruchterman and Reingold, 1991) spring embedder algorithm to calculate the forces between the nodes. ... The reason is that the algorithm seeks for a static, nota dynamic equilibrium. ... Data loading scripts extract the involved IP addresses along with port numbers, the transferred bytes, and a timestamp from tcpdump files, ... The actual behavior graph application is implemented in Java.
|Author||:||John R. Goodall, Gregory Conti, Kwan-Liu Ma|
|Publisher||:||Springer Science & Business Media - 2008-05-27|