Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams
In this paper we propose an approach to the development of the computer network visualization system for security monitoring, which uses a conceptually new model of graphic visualization that is similar to the Voronoi diagrams. The proposed graphical mode
- PDF / 2,182,969 Bytes
- 17 Pages / 439.37 x 666.142 pts Page_size
- 19 Downloads / 202 Views
Abstract. In this paper we propose an approach to the development of the computer network visualization system for security monitoring, which uses a conceptually new model of graphic visualization that is similar to the Voronoi diagrams. The proposed graphical model uses the size, color and opacity of the cell to display host parameters. The paper describes a technique for new graphical model construction and gives examples of its application along with traditional graph based and other models. Keywords: Visual analytics Visualization of security data models Computer networks Voronoi diagrams
Graphical
1 Introduction Computer networks are rapidly growing today. Meanwhile, the more devices are in the network, the harder it is to ensure its security. This problem is met by operators of security systems of corporate level (e.g., security information and event management systems, SIEM systems), when the analyzed computer network is measured not only by hundreds of employees’ workplaces and high order technical equipment, but also by smart doors, servers, various sensors of climate, security, etc. To cope with the control of growing networks we need to apply systems for monitoring network security, which give us possibility to visualize the computer network and parameters of its state in a simple and efficient manner. But, as a rule, in such systems the network is presented with the application of rather traditional graphical models, for example, in the form of graphs or tables, that are difficult to understand in the case of large networks and display of a variety of parameters. In order to cope with this problem it is necessary to improve the efficiency of visualization means by complex use of various graphical models such as graphs, matrices, treemaps, parallel coordinates, etc. in the framework of the multiple view concept [1]. At the same time it is necessary to increase the efficiency of visualization of particular graphic models. In the case of visualization of computer networks and their security, different techniques are developed that allow clustering of segments of the network (e.g., based on clustering of graph elements) or encapsulation of the state parameters [2]. © IFIP International Federation for Information Processing 2016 Published by Springer International Publishing Switzerland 2016. All Rights Reserved F. Buccafurri et al. (Eds.): CD-ARES 2016, LNCS 9817, pp. 141–157, 2016. DOI: 10.1007/978-3-319-45507-5_10
142
M. Kolomeets et al.
Yet another solution to the problem is to develop conceptually new graphical models, which are able to present information in a form that is new for the user and that allows to increase the efficiency of the user’s work. The novelty of this paper is to use a conceptually new graphic visualization model similar to the Voronoi diagrams, which allows to increase the effectiveness of visual analysis for the computer network security, for example, as one of functions of the SIEM system. It is expected that this model will be used in the developed visualization system
Data Loading...