Using Visualization to investigate security attacks faster
Humans are better processors of visual information than text. Novel visualizations enable humans to sort through huge amounts of log file data to apply our best asset, visual pattern recognition, to detect anomolous behaviors.
- Lightweight - portable to major OSes and requiring no installation
- Real-time log analysis - visualize events from monitored web applications and devices in real time
- Enabling human pattern recognition - Enabling users to apply their own contextual knowledge of their environments to help identify anomolous activity and complement automated systems
- Usable for experts and novices - Preliminary studies have shown that users with no training in security can quickly identify certain types of security attacks using InViz