@inproceedings{05517075a24f41c1bdb1f68f2ce59053,
title = "Data visualization in cybersecurity",
abstract = "Cybersecurity is receiving more attention these years because an increasing number of hackings have been reported. Visualization of data can assist in bringing attention to this issue. Log files are used to keep track of all the users that have accessed a server. Charts and graphs can help get a better understanding of the security log files. The IP addresses extracted from log files can be used to track the location of the machines that are trying to connect to the servers. A third-party geo-locating API is available to match IP addresses to identify where the user resides. Google Maps API can mark where the IP addresses are on the map based on the location given. This research focuses on visualizing the unauthorized access attempts on the servers by extracting the user data from the log files that were collected from 3 servers over a 2-month period.",
keywords = "Apache web server, Cybersecurity, Google charts, Logs, MySQL database, Visualization",
author = "Nadeem, {Syed Fahad} and Huang, {Ching Yu}",
note = "Publisher Copyright: {\textcopyright} 2018 IEEE.; 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018 ; Conference date: 13-12-2018 Through 15-12-2018",
year = "2018",
month = dec,
doi = "10.1109/CSCI46756.2018.00017",
language = "English",
series = "Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "48--52",
booktitle = "Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018",
}