Data visualization in cybersecurity
Cybersecurity is receiving more attention these years because an increasing number of hackings have been reported. Visualization of data can assist in bringing attention to this issue. Log files are used to keep track of all the users that have accessed a server. Charts and graphs can help get a better understanding of the security log files. The IP addresses extracted from log files can be used to track the location of the machines that are trying to connect to the servers. A third-party geo-locating API is available to match IP addresses to identify where the user resides. Google Maps API can mark where the IP addresses are on the map based on the location given. This research focuses on visualizing the unauthorized access attempts on the servers by extracting the user data from the log files that were collected from 3 servers over a 2-month period.
Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018
First Page Number
Last Page Number
Nadeem, Syed Fahad and Huang, Ching Yu, "Data visualization in cybersecurity" (2018). Kean Publications. 1441.