Full metadata record
DC poleHodnotaJazyk
dc.contributor.authorHausdorf, Alrik
dc.contributor.authorHinzmann, Nicole
dc.contributor.authorZeckzer, Dirk
dc.contributor.editorSkala, Václav
dc.date.accessioned2019-10-22T09:22:31Z-
dc.date.available2019-10-22T09:22:31Z-
dc.date.issued2019
dc.identifier.citationWSCG 2019: full papers proceedings: 27. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, p. 45-54.en
dc.identifier.isbn978-80-86943-37-4 (CD/-ROM)
dc.identifier.issn2464–4617 (print)
dc.identifier.issn2464-4625 (CD/DVD)
dc.identifier.urihttp://hdl.handle.net/11025/35608
dc.format10 s.cs
dc.format.mimetypeapplication/odt
dc.language.isoenen
dc.publisherVáclav Skala - UNION Agencycs
dc.rights© Václav Skala - UNION Agencycs
dc.subjectvizualizace zabezpečenícs
dc.subjectstopy systémového volánícs
dc.subjectbezpečnostní analýzacs
dc.subjectanalýza chovánícs
dc.titleSyCaT-Vis: Visualization-Based Support of Analyzing System Behavior based on System Call Tracesen
dc.typekonferenční příspěvekcs
dc.typeconferenceObjecten
dc.rights.accessopenAccessen
dc.type.versionpublishedVersionen
dc.description.abstract-translatedDetecting anomalies in the behavior of a computer system is crucial for determining its security. One way of detecting these anomalies is based on the assessment of the amount and sequence of system calls issued by processes. While the number of processes on a computer can become very large, the number of system calls issued during the lifespan of such a process and its subprocesses can be humongous. In order to decide whether these anomalies are due to the intended system usage or if they are caused by malicious actions, this humongous amount of data needs being analyzed. Thus, a careful analysis of the system calls’ types, their amount, and their temporal sequence requires sophisticated support. Visualization is frequently used for this type of tasks. Starting with a carefully aggregation of the data presented in an overview representation, the quest for information is supported by carefully crafted interactions. These allow filtering the tremendous amount of data, thus removing the standard behavior data and leaving the potentially suspicious one. The latter can then be investigated on increasingly finer levels. Supporting this goal-oriented analysis, we propose novel interactive visualizations implemented in the tool SyCaT-Vis. SyCaT-Vis fosters obtaining important insights into the behavior of computer systems, the processes executed, and the system call sequences issued.en
dc.subject.translatedsecurity visualizationen
dc.subject.translatedsystem call tracesen
dc.subject.translatedsecurity analysisen
dc.subject.translatedbehavior analysisen
dc.identifier.doihttps://doi.org/10.24132/CSRN.2019.2901.1.6
dc.type.statusPeer-revieweden
Vyskytuje se v kolekcích:WSCG 2019: Full Papers Proceedings

Soubory připojené k záznamu:
Soubor Popis VelikostFormát 
Hausdorf.pdfPlný text1,97 MBAdobe PDFZobrazit/otevřít


Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://hdl.handle.net/11025/35608

Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.