Characterizing the Behavior of Cyber Adversaries: The Means, Motive, and Opportunity of Cyberattacks
Towards Classifying and Selecting Appropriate Security Visualization Techniques
ABSTRACT:
Visualization of network security events has become an important method for detecting, responding to, and resolving security incidents. While there are many security visualization tools and techniques available, each one may require a different run-time environment and data input, making it difficult for a network security analyst to try them all (or a significant subset) and select those that work best for a specific incident or purpose.