Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements

نویسندگان

  • William Yurcik
  • James Barlow
  • Kiran Lakkaraju
  • Mike Haberman
چکیده

The critical role of the human operator in security operations has not been a focus of existing tools created by security developers. In this paper we describe interface requirements for usable and effective security operations tools to assess security situational awareness on large and complex computer networks. We have developed two prototype security monitoring tools based on these interface requirements and are progressing on usability studies to evaluate their effectiveness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Network Intrusion Detection Cognitive Task Analysis: Textual and Visual Tool Usage and Recommendations

A task analysis is conducted for the complex task of network security engineers, intrusion detection (ID) of computer networks. ID helps engineers protect network from harmful attacks and can be broken down into the following phases: pre-processing information, monitoring the network, analyzing attacks, and responding to attacks. Different cognitive loads are placed on the engineer at each phas...

متن کامل

Continuous and Cuffless Blood Pressure Monitoring Based on ECG and SpO2 Signals By Using Microsoft Visual C Sharp

Background: One of the main problems especially in operating room and monitoring devices is measurement of Blood Pressure (BP) by sphygmomanometer cuff.Objective: In this study we designed a new method to measure BP changes continuously for detecting information between cuff inflation times by using vital signals in monitoring devices. This will be achieved by extraction of the time difference ...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Tapping Alert Protocol

This paper proposes a new protocol called tapping alert protocol (TAP), which detects if any computer is eavesdropping on the network. When tapping is detected, it alerts the network users on the danger of tapping. In designing the protocol, a model for an attacker is developed who sniffs the network and breaks down the proposed protocol, and the requirements on the protocol in terms of efficie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003