Visual Analysis of Computer Network Security Assessment
Keywords:
Security Visualization, Security Evaluation, Security Policies, Attack Graphs, TreemapsAbstract
There have been studied different visualization techniques for assessment of computer network security. Visualization component of a network security evaluation system has been described; it differs from other systems by its ability to visualize both reports of scanner vulnerability and attack graphs, thus, providing the system operator with an opportunity to correlate potential causes of breach of security and possible consequences of the system utilization by an intruder.
Published
2013-06-20
How to Cite
Kotenko, I., & Novikova, E. (2013). Visual Analysis of Computer Network Security Assessment. Information and Control Systems, (3), 55–61. Retrieved from http://proceedings.spiiras.nw.ru/index.php/ius/article/view/13641
Issue
Section
Information security