TY - GEN
T1 - Wireless cyber assets discovery visualization
AU - Prole, Kenneth
AU - Goodall, John R.
AU - D'Amico, Anita D.
AU - Kopylec, Jason K.
PY - 2008
Y1 - 2008
N2 - As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.
AB - As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.
KW - Coordinated views
KW - Geographic visualization
KW - Information visualization
KW - Visual analytics
KW - Wardriving
KW - Wireless discovery
KW - Wireless security
UR - http://www.scopus.com/inward/record.url?scp=56449114823&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-85933-8_13
DO - 10.1007/978-3-540-85933-8_13
M3 - Conference contribution
AN - SCOPUS:56449114823
SN - 3540859314
SN - 9783540859314
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 136
EP - 143
BT - Visualization for Computer Security - 5th International Workshop, VizSec 2008, Proceedings
T2 - 5th International Workshop on Visualization for Computer Security, VizSec 2008
Y2 - 15 September 2008 through 15 September 2008
ER -