Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements
نویسندگان
چکیده
The critical role of the human operator in security operations has not been a focus of existing tools created by security developers. In this paper we describe interface requirements for usable and effective security operations tools to assess security situational awareness on large and complex computer networks. We have developed two prototype security monitoring tools based on these interface requirements and are progressing on usability studies to evaluate their effectiveness.
منابع مشابه
An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملNetwork Intrusion Detection Cognitive Task Analysis: Textual and Visual Tool Usage and Recommendations
A task analysis is conducted for the complex task of network security engineers, intrusion detection (ID) of computer networks. ID helps engineers protect network from harmful attacks and can be broken down into the following phases: pre-processing information, monitoring the network, analyzing attacks, and responding to attacks. Different cognitive loads are placed on the engineer at each phas...
متن کاملContinuous and Cuffless Blood Pressure Monitoring Based on ECG and SpO2 Signals By Using Microsoft Visual C Sharp
Background: One of the main problems especially in operating room and monitoring devices is measurement of Blood Pressure (BP) by sphygmomanometer cuff.Objective: In this study we designed a new method to measure BP changes continuously for detecting information between cuff inflation times by using vital signals in monitoring devices. This will be achieved by extraction of the time difference ...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملTapping Alert Protocol
This paper proposes a new protocol called tapping alert protocol (TAP), which detects if any computer is eavesdropping on the network. When tapping is detected, it alerts the network users on the danger of tapping. In designing the protocol, a model for an attacker is developed who sniffs the network and breaks down the proposed protocol, and the requirements on the protocol in terms of efficie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003