• Title/Summary/Keyword: network visualization

Search Result 469, Processing Time 0.032 seconds

A Framework for Visualizing Social Network Influence (사회연결망 영향력 시각화를 위한 프레임워크)

  • Jang, Sun-Hee;Jang, Seok-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.139-146
    • /
    • 2009
  • This paper deals with visualization that can appropriately show the characteristics deduced from relationships between pieces of information. The visualization of influence, which is used as an important index in deducing the characteristics of relationships in social network analysis, was selected as research topic, and first, the elements that show relationships within the network and the index that show influence were classified and organized. Second, the links between relational elements that show influence in social network were examined, and an influence visualization network was created. Third, an influence visualization framework was proposed which explains the interaction between social network analysis and visualization process. The influence visualization network and framework being proposed in this paper can be used not only to understand and analyze the elements that influence social network but also to make it possible to have a rational and efficient approach to network visualization. Hopefully, they will become a new methodological approach to information design.

  • PDF

The Artistic Practical Use of Social Network Visualization through the Information Aesthetic Interpretation (정보미학적 해석을 통한 소셜네트워크 시각화의 예술적 활용)

  • Bang, Seungae;Yoon, Joonsung
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.7
    • /
    • pp.16-23
    • /
    • 2013
  • This paper analyzes the artistic practical use of social network visualization through the aesthetic information interpretation. The first social network visualization has emerged as 'Sociogram' in the form of social network analysis(SNA). Since social network has complex, the analyzing technology of social network has emerged. Early social network visualization has a practical purpose to measure the social structure, but current social network visualization divided into various forms from artistic expressions through information. This paper divide into two categories based on the artistic application of social network visualization. First, this research focuses on the static graph based on analog. Second, this research analyze the category of interacted visualization to generate a real-time digital image. This paper presents the fusion of paradigm between engineering and art through this way.

A Quantitative Approach for Data Visualization in Human Resource Management

  • Bandar Abdullah AlMobark
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.133-139
    • /
    • 2023
  • As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a quantitative method for analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.

A Bibliometric Analysis Data Visualization in Human Resource Management

  • Bandar Abdullah AlMobark
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.162-168
    • /
    • 2023
  • As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a bibliometric analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.

Proximity based Circular Visualization for similarity analysis of voting patterns between nations in UN General Assembly (UN 국가의 투표 성향 유사도 분석을 위한 Proximity based Circular 시각화 연구)

  • Choi, Han Min;Mun, Seong Min;Ha, Hyo Ji;Lee, Kyung Won
    • Design Convergence Study
    • /
    • v.14 no.4
    • /
    • pp.133-150
    • /
    • 2015
  • In this study, we proposed Interactive Visualization methods that can be analyzed relations between nations in various viewpoints such as period, issue using total 5211 of the UN General Assembly voting data.For this research, we devised a similarity matrix between nations and developed two visualization method based similarity matrix. The first one is Network Graph Visualization that can be showed relations between nations which participated in the vote of the UN General Assembly like Social Network Graph by year. and the second one is Proximity based Circular Visualization that can be analyzed relations between nations focus on one nation or Changes in voting patterns between nations according to time. This study have a great signification. that's because we proposed Proximity based Circular Visualization methods which merged Line and Circle Graph for network analysis that never tried from other cases of studies that utilize conventional voting data and made it. We also derived co-operatives of each visualization through conducting a comparative experiment for the two visualization. As a research result, we found that Proximity based Circular Visualization can be better analysis each node and Network Graph Visualization can be better analysis patterns for the nations.

Monitoring Network Security Situation Based on Flow Visualization (플로우 시각화 기반의 네트워크 보안 상황 감시)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper we propose a new method of security visualization, VisFlow, using traffic flows to solve the problems of existing traffic flows based visualization techniques that were a loss of end-to-end semantics of communication, reflection problem by symmetrical address coordinates space, and intuitive loss problem in mass of traffic. VisFlow, a simple and effective security visualization interface, can do a real-time analysis and monitoring the situation in the managed network with visualizing a variety of network behavior not seen in the individual traffic data that can be shaped into patterns. This is a way to increase the intuitiveness and usability by identifying the role of nodes and by visualizing the highlighted or simplified information based on their importance in 2D/3D space. In addition, it monitor the network security situation as a way to increase the informational effectively using the asymmetrical connecting line based on IP addresses between pairs of nodes. Administrator can do a real-time analysis and monitoring the situation in the managed network using VisFlow, it makes to effectively investigate the massive traffic data and is easy to intuitively understand the entire network situation.

Network Attacks Visualization using a Port Role in Network Sessions (트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화)

  • Chang, Beomhwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.47-60
    • /
    • 2015
  • In this paper, we propose a simple and useful method using a port role to visualize the network attacks. The port role defines the behavior of the port from the source and destination port number of network session. Based on the port role, the port provides the brief security features of each node as an attacker, a victim, a server, and a normal host. We have automatically classified and identified the type of node based on the port role and security features. We detected and visualized the network attacks using these features of the node by the port role. In addition, we are intended to solve the problems with existing visualization technologies which are the reflection problem caused an undirected network session and the problem caused decreasing of distinct appearance when occurs a large amount of the sessions. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacker, victim, server, and hosts. In addition, by providing a categorized analysis of network attacks, this method can more precisely detect and distinguish them from normal sessions.

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.

Anomaly Detection Using Visualization-based Network Forensics (비정상행위 탐지를 위한 시각화 기반 네트워크 포렌식)

  • Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.25-38
    • /
    • 2017
  • Many security threats are occurring around the world due to the characteristics of industrial control systems that can cause serious damage in the event of a security incident including major national infrastructure. Therefore, the industrial control system network traffic should be analyzed so that it can identify the attack in advance or perform incident response after the accident. In this paper, we research the visualization technique as network forensics to enable reasonable suspicion of all possible attacks on DNP3 control system protocol, and define normal action based rules and derive visualization requirements. As a result, we developed a visualization tool that can detect sudden network traffic changes such as DDoS and attacks that contain anormal behavior from captured packet files on industrial control system network. The suspicious behavior in the industrial control system network can be found using visualization tool with Digital Bond packet.