Title :
3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security
Author :
Nunnally, Thomas ; Uluagac, A. Selcuk ; Copeland, J.A. ; Beyah, Raheem
Author_Institution :
CSC Lab., Georgia Inst. of Technol., Atlanta, GA, USA
Abstract :
As the volume of network data continues to increase and networks become more complex, the ability to accurately manage and analyze data quickly becomes a difficult problem. Many network management tools already use two-dimensional (2D) and three-dimensional (3D) visualization techniques to help support decision-making and reasoning of network anomalies and activity. However, a poor user interface combined with the massive amount of data could obfuscate important network details. As a result, administrators may fail to detect and identify malicious network behavior in a timely manner. 3D visualizations address this challenge by introducing monocular and binocular visual cues to portray depth and to increase the perceived viewing area. In this work, we explore these cues for 3D network security applications, with a particular emphasis on binocular disparity or stereoscopic 3D. Currently, no network security tool takes advantage of the enhanced depth perception provided by stereoscopic 3D technologies for vulnerability assessment. Compared to traditional 3D systems, stereoscopic 3D helps improve the perception of depth, which can, in turn reduce the number of errors and increase response times of network administrators. Thus, we introduce a stereoscopic 3D visual Framework for Rendering Enhanced 3D Stereoscopic Visualizations for Network Security (FRE3DS). Our novel framework uses state-of-the art 3D graphics rendering to assist in 3D visualizations for network security applications. Moreover, utilizing our framework, we propose a new 3D Stereoscopic Vulnerability Assessment Tool (3DSVAT). We illustrate the use of 3DSVAT to assist in rapid detection and correlation of attack vulnerabilities in a subset of a modified local area network data set using the enhanced perception of depth in a stereoscopic 3D environment.
Keywords :
computer network security; data visualisation; decision making; local area networks; rendering (computer graphics); stereo image processing; 2D visualization technique; 3D graphics rendering; 3D network security application; 3D stereoscopic vulnerability assessment tool; 3D visualization technique; 3DSVAT; FRE3DS; attack detection; attack vulnerabilities; attck correlation; binocular disparity; binocular visual cues; data analysis; data management; decision-making; enhanced 3D stereoscopic visualization; local area network; malicious network behavior; monocular visual cues; network activity; network administrator; network anomaly; network data; network management tool; network security tool; stereoscopic 3D environment; stereoscopic 3D visual framework; user interface; Arrays; Cameras; Data visualization; Rendering (computer graphics); Security; Stereo image processing; Visualization; Security Visualization; Stereoscopic 3D; Vulnerability Assessment Tool;
Conference_Titel :
Local Computer Networks (LCN), 2012 IEEE 37th Conference on
Conference_Location :
Clearwater, FL
Print_ISBN :
978-1-4673-1565-4
DOI :
10.1109/LCN.2012.6423586