Wireless cyber assets discovery visualization

Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.

Original languageEnglish
Title of host publicationVisualization for Computer Security - 5th International Workshop, VizSec 2008, Proceedings
Pages136-143
Number of pages8
DOIs
StatePublished - 2008
Externally publishedYes
Event5th International Workshop on Visualization for Computer Security, VizSec 2008 - Cambridge, MA, United States
Duration: Sep 15 2008Sep 15 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5210 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Workshop on Visualization for Computer Security, VizSec 2008
Country/TerritoryUnited States
CityCambridge, MA
Period09/15/0809/15/08

Keywords

  • Coordinated views
  • Geographic visualization
  • Information visualization
  • Visual analytics
  • Wardriving
  • Wireless discovery
  • Wireless security

Fingerprint

Dive into the research topics of 'Wireless cyber assets discovery visualization'. Together they form a unique fingerprint.

Cite this