Security Visualization Extended Review Issues, Classifications, Validation Methods, Trends, Extensions

2018-04-01
Özdemir Sönmez, Fatma Ferda
Günel Kılıç, Banu
Security visualization has been an issue, and it continues to grow in many directions. In order to give sufficient security visualization designs, information both in many different aspects of visualization techniques and the security problems is required. More beneficial designs depend on decisions that include use cases covering security artifacts and business requirements of the organizations, correct and optimal use of data sources, and selection of proper display types. To be able to see the big picture, the designers should be aware of available data types, possible use cases and different styles of displays. In this chapter, these properties of a large set of earlier security visualization work have been depicted and classified using both textual and graphical ways. This work also contains information related to trending topics of the domain, ways of user interaction, evaluation, and validation techniques that are commonly used for the security visualization designs.

Suggestions

NETWORK INTRUSION DETECTION WITH A DEEP LEARNING APPROACH
Kültür, Ebru; Acar, Aybar Can; Department of Cybersecurity (2022-2-7)
With the rapid growth of the information technology in several areas, providing security of those systems has gained more importance. As a result of this development in information technology, the complexity of cyber-attacks has also significantly increased. Therefore, traditional security tools such as Signature-based Intrusion Detection Systems (SIDS) have become insufficient for detecting new attacks. Intrusion Detection Systems (IDS) are used to monitor network traffic and capture malicious traffic. Tra...
A Deep reinforcement learning approach to network intrusion detection
Gülmez, Halim Görkem; Angın, Pelin; Department of Computer Engineering (2019)
Intrusion detection is one of the most important problems in today’s world. Every daynew attacks are being used in order to breach the security of systems and signature-based security systems fail to detect these zero-day attacks. An anomaly-basedintrusion detection system, particularly one that utilizes a machine learning approach,is needed to effectively handle these kinds of attacks. With the advancements in bigdata technologies, storing and handling data became easier, therefore big dataanalytics has be...
Security Qualitative Metrics for Open Web Application Security Project Compliance
Sönmez, Ferda Özdemir (Elsevier BV; 2019)
The focus of this study is to find out repeatable features for large-scale enterprise web application production process related to based on OWASP security requirement list. As a result of a rigorous work including domain analysis for Java language and development frameworks and the examination of a large set of technical documents, 230 security qualitative metrics are discovered, under six categories. These security qualitative metrics are beneficial for security analysts as well as other parties such as d...
E-government adoption model based on theory of planned behavior: empirical investigation
Kanat, İrfan Emrah; Özkan Yıldırım, Sevgi; Department of Information Systems (2009)
The e-government phenomena has become more important with the ever increasing number of implementations world wide. A model explaining the e-government adoption and the related measurement instrument a survey had been developed and validated in this study. In a post technology acceptance model (TAM) approach, theory of planned behavior (TPB) was extended to t the requirements of e-government context. The adoption of student loans service of the higher education student loans and accommodation association...
Anomaly-based cyber intrusion detection system with ensemble classifier
Sarıkaya, Alper; Günel Kılıç, Banu; Department of Information Systems (2018)
Nowadays, cyberattacks are occurring progressively. Along with this, diversity, size and density of the cyberattacks are increasing. When the logs of security devices are analyzed, massive amounts of attack signs are detained. Besides, it is also difficult for humans to evaluate the logs accurately. Therefore, the identification of key data, which can be used to distinguish an attack from this very large data set, is important for both rapid detection of attacks and rapid response of security devices. This ...
Citation Formats
F. F. Özdemir Sönmez and B. Günel Kılıç, “Security Visualization Extended Review Issues, Classifications, Validation Methods, Trends, Extensions,” pp. 152–197, 2018, Accessed: 00, 2021. [Online]. Available: https://www.igi-global.com/book/security-privacy-management-techniques-protocols/190472.