Graph drawing with applications in network security
Monitoring the network activity in a continuous basis is necessary but time-consuming task. Traditionally, the monitoring process is achieved by a combination of log file analysis, traffic analysis and intrusion detection systems. Even though most systems are equipped with mechanisms that produce sufficient log files, processing the huge amount of data requires significant effort, and usually is performed with little or no automated support.
Visualization is essential in cases of large data sets such the ones produced in a network, since it interprets the huge amount of data rows into a more comprehensive visual image. Thus, by taking advantage of the human perception, the analysis of the visualization and the corresponding decision making becomes easier and more efficient. Visualizations can also be useful in fraud detection. Since bussiness anti-fraud control systems also produce textual logs in non-uniform formats, information visualization can be promising since it facilitates the quick identification of fraudulent activity.