Data visualization in cybersecurity
Document Type
Conference Proceeding
Publication Date
12-1-2018
Abstract
Cybersecurity is receiving more attention these years because an increasing number of hackings have been reported. Visualization of data can assist in bringing attention to this issue. Log files are used to keep track of all the users that have accessed a server. Charts and graphs can help get a better understanding of the security log files. The IP addresses extracted from log files can be used to track the location of the machines that are trying to connect to the servers. A third-party geo-locating API is available to match IP addresses to identify where the user resides. Google Maps API can mark where the IP addresses are on the map based on the location given. This research focuses on visualizing the unauthorized access attempts on the servers by extracting the user data from the log files that were collected from 3 servers over a 2-month period.
Publication Title
Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018
First Page Number
48
Last Page Number
52
DOI
10.1109/CSCI46756.2018.00017
Recommended Citation
Nadeem, Syed Fahad and Huang, Ching Yu, "Data visualization in cybersecurity" (2018). Kean Publications. 1441.
https://digitalcommons.kean.edu/keanpublications/1441