An information visualization framework for intrusion detection

Anita Komlodi, John R. Goodall, Wayne G. Lutters

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

37 Scopus citations

Abstract

This paper reports a framework for designing information visualization (IV) tools for monitoring and analysis activities. In this user study, the domain for these activities is network intrusion detection (ID). User-centered design methods have been widely used for many years, however, innovative IV displays are often developed with limited consideration of user needs in the context of real-life problems. While it can be argued that this is required to generate creative new solutions, the resulting tools often do not support actual users in their daily work. Several IV tools have been developed to support ID, but there is little evidence that these solutions address the needs of the users. We studied ID analysts' daily activities in order to understand their routine work practices and the need for designing IV tools. We developed a three-phase process model that frames corresponding requirements for IV tools. This model significantly extends the scope of contemporary IV for ID tools in novel ways.

Original languageEnglish
Title of host publicationExtended Abstracts on Human Factors in Computing Systems, CHI EA 2004
Pages1743-1746
Number of pages4
DOIs
StatePublished - 2004
Externally publishedYes
EventConference on Human Factors in Computing Systems, CHI EA 2004 - Vienna, Austria
Duration: Apr 24 2004Apr 29 2004

Publication series

NameConference on Human Factors in Computing Systems - Proceedings

Conference

ConferenceConference on Human Factors in Computing Systems, CHI EA 2004
Country/TerritoryAustria
CityVienna
Period04/24/0404/29/04

Keywords

  • Design implications
  • Information visualization
  • Interaction design
  • Intrusion detection
  • User studies

Fingerprint

Dive into the research topics of 'An information visualization framework for intrusion detection'. Together they form a unique fingerprint.

Cite this