User requirements and design of a visualization for intrusion detection analysis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Scopus citations

Abstract

This paper reports on the user requirements gathering activities and design of an information visualization tool for analyzing network data for intrusion detection (ID). User-centered design methods have been widely used for many years. However, innovative visualization displays are often developed with limited consideration of user needs in the context of real-life problems. While it can be argued that this is required to generate creative new solutions, the resulting tools may not fully support actual users in their daily work. We studied ID analysts' activities in order to understand their work practices. This resulted in a simple task model of ID work and guidelines for visualization support. Noting the lack of current visualization support for the analysis ID task and grounded in the actual needs of ID analysts, we designed a visualization prototype for investigating network traffic.

Original languageEnglish
Title of host publicationProceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Pages394-401
Number of pages8
DOIs
StatePublished - 2005
Event6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 - West Point, NY, United States
Duration: Jun 15 2005Jun 17 2005

Publication series

NameProceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Volume2005

Conference

Conference6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Country/TerritoryUnited States
CityWest Point, NY
Period06/15/0506/17/05

Keywords

  • Information visualization
  • Intrusion detection
  • User centered design

Fingerprint

Dive into the research topics of 'User requirements and design of a visualization for intrusion detection analysis'. Together they form a unique fingerprint.

Cite this