Data visualization in cybersecurity

Syed Fahad Nadeem, Ching Yu Huang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Cybersecurity is receiving more attention these years because an increasing number of hackings have been reported. Visualization of data can assist in bringing attention to this issue. Log files are used to keep track of all the users that have accessed a server. Charts and graphs can help get a better understanding of the security log files. The IP addresses extracted from log files can be used to track the location of the machines that are trying to connect to the servers. A third-party geo-locating API is available to match IP addresses to identify where the user resides. Google Maps API can mark where the IP addresses are on the map based on the location given. This research focuses on visualizing the unauthorized access attempts on the servers by extracting the user data from the log files that were collected from 3 servers over a 2-month period.

Original languageEnglish
Title of host publicationProceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages48-52
Number of pages5
ISBN (Electronic)9781728113609
DOIs
StatePublished - Dec 2018
Event2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018 - Las Vegas, United States
Duration: 13 Dec 201815 Dec 2018

Publication series

NameProceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018

Conference

Conference2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018
Country/TerritoryUnited States
CityLas Vegas
Period13/12/1815/12/18

Keywords

  • Apache web server
  • Cybersecurity
  • Google charts
  • Logs
  • MySQL database
  • Visualization

Fingerprint

Dive into the research topics of 'Data visualization in cybersecurity'. Together they form a unique fingerprint.

Cite this