Data visualization in cybersecurity

Document Type

Conference Proceeding

Publication Date

12-1-2018

Abstract

Cybersecurity is receiving more attention these years because an increasing number of hackings have been reported. Visualization of data can assist in bringing attention to this issue. Log files are used to keep track of all the users that have accessed a server. Charts and graphs can help get a better understanding of the security log files. The IP addresses extracted from log files can be used to track the location of the machines that are trying to connect to the servers. A third-party geo-locating API is available to match IP addresses to identify where the user resides. Google Maps API can mark where the IP addresses are on the map based on the location given. This research focuses on visualizing the unauthorized access attempts on the servers by extracting the user data from the log files that were collected from 3 servers over a 2-month period.

Publication Title

Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018

First Page Number

48

Last Page Number

52

DOI

10.1109/CSCI46756.2018.00017

This document is currently not available here.

Share

COinS