Skip to main content
Top

2013 | OriginalPaper | Chapter

Towards Visualizing Mobile Network Data

Authors : Stavros Papadopoulos, Dimitrios Tzovaras

Published in: Information Sciences and Systems 2013

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents the research directions that the visualization in the NEMESYS project will follow, so as to visualize mobile network data and detect possible anomalies. These directions are based on the previous approaches on network security visualization and attack attribution techniques, while possible extensions are also discussed based on the presented approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gelenbe E, Gorbil G, Tzovaras D, Liebergeld S, Garcia D, Baltatu M, Lyberopoulos G (2013) Nemesys: enhanced network security for seamless service provisioning in the smart mobile ecosystem. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct 2013, accepted for publication Gelenbe E, Gorbil G, Tzovaras D, Liebergeld S, Garcia D, Baltatu M, Lyberopoulos G (2013) Nemesys: enhanced network security for seamless service provisioning in the smart mobile ecosystem. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct 2013, accepted for publication
2.
go back to reference Delosieres L, Garcia D (2013) Infrastructure for detecting android malware. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct 2013, accepted for publication Delosieres L, Garcia D (2013) Infrastructure for detecting android malware. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct 2013, accepted for publication
3.
go back to reference Baltatu M, D’Alessandro R, D’Amico R (2013) NEMESYS: first year project experience in Telecom Italia Information Technology. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct. 2013, accepted for publication Baltatu M, D’Alessandro R, D’Amico R (2013) NEMESYS: first year project experience in Telecom Italia Information Technology. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct. 2013, accepted for publication
4.
go back to reference Liebergeld S, Lange M (2013) Android security, pitfalls, lessons learned and BYOD. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct. 2013, accepted for publication Liebergeld S, Lange M (2013) Android security, pitfalls, lessons learned and BYOD. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct. 2013, accepted for publication
5.
go back to reference Abdelrahman O, Gelenbe E, Gorbil G, Oklander B (2013) Mobile network anomaly detection and mitigation: the NEMESYS approach. In Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct. 2013, accepted for publication Abdelrahman O, Gelenbe E, Gorbil G, Oklander B (2013) Mobile network anomaly detection and mitigation: the NEMESYS approach. In Proceedings of 28th international symposium on computer and information sciences (ISCIS’13), Oct. 2013, accepted for publication
6.
go back to reference Shiravi H, Shiravi A, Ghorbani AA (2011) A survey of visualization systems for network security. IEEE Trans Visual Comput Graphics 1(1):1–19 Shiravi H, Shiravi A, Ghorbani AA (2011) A survey of visualization systems for network security. IEEE Trans Visual Comput Graphics 1(1):1–19
7.
go back to reference Shen Z, Ma KL (2008) Mobivis: a visualization system for exploring mobile data. In: Visualization symposium, 2008. PacificVIS’08. IEEE Pacific, pp 175–182, IEEE, 2008 Shen Z, Ma KL (2008) Mobivis: a visualization system for exploring mobile data. In: Visualization symposium, 2008. PacificVIS’08. IEEE Pacific, pp 175–182, IEEE, 2008
8.
go back to reference Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquit Comput 10(4):255–268CrossRef Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquit Comput 10(4):255–268CrossRef
9.
go back to reference Lambert MJ (2005) Visualizing and analyzing human-centered data streams. PhD thesis, Massachusetts Institute of Technology Lambert MJ (2005) Visualizing and analyzing human-centered data streams. PhD thesis, Massachusetts Institute of Technology
10.
go back to reference Tsigkas O, Tzovaras D (2012) Analysis of Rogue Anti-Virus Campaigns using hidden structures in k-Partite graphs. Cryptology and network Security, pp 114–125, Springer, Berlin Tsigkas O, Tzovaras D (2012) Analysis of Rogue Anti-Virus Campaigns using hidden structures in k-Partite graphs. Cryptology and network Security, pp 114–125, Springer, Berlin
11.
go back to reference Tsigkas O, Thonnard O, Tzovaras D (2012) Visual spam campaigns analysis using abstract graphs representation. In: Symposium on visualization for cyber security, Seattle, WA, USA Tsigkas O, Thonnard O, Tzovaras D (2012) Visual spam campaigns analysis using abstract graphs representation. In: Symposium on visualization for cyber security, Seattle, WA, USA
12.
go back to reference Papadopoulos S, Moustakas K, Tzovaras D (2012) Hierarchical visualization of BGP routing changes using entropy measures. In: Bebis G, Boyle R, Parvin B, Koracin D, Fowlkes C, Wang S, Choi MH, Mantler S, Schulze J, Acevedo D, Mueller K, Papka M (eds) Advances in visual computing, vol 7432 of Lecture notes in computer science. Springer, Berlin Heidelberg, pp 696–705 Papadopoulos S, Moustakas K, Tzovaras D (2012) Hierarchical visualization of BGP routing changes using entropy measures. In: Bebis G, Boyle R, Parvin B, Koracin D, Fowlkes C, Wang S, Choi MH, Mantler S, Schulze J, Acevedo D, Mueller K, Papka M (eds) Advances in visual computing, vol 7432 of Lecture notes in computer science. Springer, Berlin Heidelberg, pp 696–705
13.
go back to reference Fuchs J, Fischer F, Mansmann F, Bertini E, Isenberg P et al (2013) Evaluation of alternative glyph designs for time series data in a small multiple setting. In: Proceedings of the conference on human factors in computing systems (CHI) Fuchs J, Fischer F, Mansmann F, Bertini E, Isenberg P et al (2013) Evaluation of alternative glyph designs for time series data in a small multiple setting. In: Proceedings of the conference on human factors in computing systems (CHI)
14.
go back to reference Zhao L, Yang J, Fan J (2009) A fast method of coarse density clustering for large data sets. In: 2nd international conference on biomedical engineering and informatics, 2009. BMEI’09, pp 1–5, IEEE Zhao L, Yang J, Fan J (2009) A fast method of coarse density clustering for large data sets. In: 2nd international conference on biomedical engineering and informatics, 2009. BMEI’09, pp 1–5, IEEE
15.
go back to reference Adrienko N, Adrienko G (2011) Spatial generalization and aggregation of massive movement data. IEEE Trans Visual Comput Graphics 17(2):205–219CrossRef Adrienko N, Adrienko G (2011) Spatial generalization and aggregation of massive movement data. IEEE Trans Visual Comput Graphics 17(2):205–219CrossRef
16.
go back to reference Vinh NX, Epps J (2010) Mincentropy: a novel information theoretic approach for the generation of alternative clusterings. In: IEEE 10th international conference on data mining (ICDM), pp 521–530, IEEE Vinh NX, Epps J (2010) Mincentropy: a novel information theoretic approach for the generation of alternative clusterings. In: IEEE 10th international conference on data mining (ICDM), pp 521–530, IEEE
Metadata
Title
Towards Visualizing Mobile Network Data
Authors
Stavros Papadopoulos
Dimitrios Tzovaras
Copyright Year
2013
DOI
https://doi.org/10.1007/978-3-319-01604-7_37

Premium Partner