Sponsored by the National Science Foundation
Sponsored by AT&T Labs

Workshop Chair

Kwan-Liu Ma, University of California at Davis, USA

Program Co-Chairs

Stephen North, AT&T Labs, USA

Bill Yurcik, National Center for Supercomputing Applications (NCSA), USA

Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. The traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems. Some of these solutions were presented at VizSEC 2004 which was held in conjunction with ACM Computer and Communication Security Conference.

Following the success of VizSEC 2004, we bring VizSEC to the Visualization 2005 Conference. We would like to invite you to join us in this event which we believe will foster greater exchange among computer security professionals and visualization researchers. Note that this workshop will be held on Wednesday immediately following InfoVis 2005. Attendees will also be able to attend Vis2005's Keynote Speech and the rest of the main conference program.

We solicit papers that report innovative results in solving all aspects of cyber security problems with visualization techniques. All submitted papers will be peer-reviewed and accepted papers will appear in the Visualization 2005 Conference DVD proceedings as well as the ACM Digital Library. In addition, authors of the best papers will be invited to submit an expanded version of their papers to be included in the March 2006 issue of IEEE Computer Graphics and Applications.

Proceedings and Presentation Slides New!

Printed VizSEC '05 Proceedings can be purchased direclty from the IEEE Press. Presenation slides are available here.

Technical Program


10:35am - 12:30pm
Session I
Session Chair: Stephen North (AT&T Research Labs, USA)

Paper 1: "IDS RainStorm: Visualizing IDS Alarms"
Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland, John Stasko (Georgia Institute of Technology, USA)

Paper 2: "Visual Correlation of Host Processes and Traffic"
Glenn Fink, Paul Muessig, Chris North (Virginia Polytechnic Institute and State University, USA)

Paper 3: "A User-Centered Look at Glyph-Based Security Visualization"
Penny Rheingans, Anita Komlodi, Utkarsha Ayachit, John R. Goodall, Amit Joshi (University of Maryland, Baltimore County, USA)

Paper 4: "A Visualization Methodology for Characterization of Network Scans"
Chris Muelder, Kwan-Liu Ma (University of California, Davis, USA),
Tony Bartoletti (Lawrence Livermore National Laboratory, USA)

12:30pm - 1:45pm LUNCH

1:45pm - 3:45pm
Session II
Session Chair: Kwan-Liu Ma (University of California, Davis, USA)

Paper 5: "IDGraphs: Intrusion Detection and Analysis Using Histographs"
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson (Northwestern University, USA)

Paper 6: "Preserving the Big Picture: Visual Network Traffic Analysis with TNV"
John R. Goodall, Penny Rheingans, Wayne G. Lutters, Anita Komlodi (University of Maryland, Baltimore County, USA)

Paper 7: "Root Polar Layout of Internet Address Data for Security Administration"
Glenn Fink, Chris North (Virginia Polytechnic Institute and State University, USA)

Paper 8: "Visualization of Automated Trust Negotiation"
Danfeng Yao (Brown University, USA),
Michael Shin (Goldman Sachs Inc, USA),
Roberto Tamassia (Brown University, USA),
William Winsborough (George Mason University, USA)

3:45pm - 4:15pm BREAK

Short Paper Session
Session Chair: Bill Yurcik (National Center for Supercomputing Applications, USA)

Paper 9: "Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations"
Kiran Lakkaraju, Ratna Bearavolu, Adam Slagell, William Yurcik (University of Illinois at Urbana-Champaign and National Center for Supercomputing Applications, USA)

Paper 10: "Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries"
Gregory Conti, Julian Grizzard, Mustaque Ahamad, Henry Owen (Georgia Institute of Technology, USA)

Paper 11: "Visualizing Cyber Attacks Using IP Matrix"
Hideki Koike, Kazuhiro Ohno (University of Electro-Communications, Japan), Kanba Koizumi (Keio University, Japan)

Paper 12: "Multiple Coordinated Views for Network Attack Graphs"
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia (George Mason University, USA)

Paper 13: "Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned"
Anita D'Amico, Michael Kocka (Secure Decisions, USA)

Paper 14: "Exploring Three-Dimensional Visualization for Intrusion Detection"
Adam Oline, Dirk Reiners (Iowa State University, USA)

Paper 15: "Designing Visualization Capabilities for IDS Challenges"
Robert Erbacher, Kim Chrsitensen, Amanda Sundberg (Utah State University, USA)

Paper 16: "Visual Firewall: Real-time Network Security Monitor"
Chris Lee, Jason Trost, Nicholas Gibbs, Raheem Beyah, John A. Copeland (Georgia Institute of Technology, USA)



Registration is done through IEEE Visualization 2005 Conference. Please go to Vis 2005 registration page. There is a single-day option for people who plan to only attend VizSEC 2005. We encourage you to participate in the full conference including both Vis 2005 and InfoVis 2005. Note that advance registration deadline is September 23.


The Visualization 2005 Conference hotel is Hilton. Standard room (single/double) is $135/night.

Program Committee

Tony Bartoletti, Lawrence Livermore National Laboratory
Baoquan Chen, University of Minnesota
Gregory Conti, Georgia Institute of Technology
Stephen Eick, University of Illinois-Chicago & SSS Research
Robert Erbacher, Utah State University
Emden Gansner, AT&T Labs
Tom Goldring, US National Security Agency
John Goodall, University of Maryland at Baltimore County
T. J. Jankun-Kelly, Mississippi State University
Daniel Keim, University of Konstanz, Germany
Hideki Koike, University of Electro-Communications, Japan
Tamara Munzner, University of British Columbia, Canada
Klaus Mueller, Stony Brook University
Chris North, Virginia Polytechnic Institute and State University
Penny Rheingans, University of Maryland at Baltimore County
William Ribarsky, University of North Carolina at Charlotte
Richard Strelitz, Los Alamos National Laboratory
Roberto Tamassia, Brown University
Soon Tee Teoh, University of California at Davis
Vivek Verma, Sarnoff Corporation, USA
Walt Tirenin, Air Force Research Laboratory, USA
Kirsten Whitley, US Department of Defense
Pak Chung Wong, Pacific Northwest National Laboratory

Important Dates

Full paper due (up to 8 pages)       May 8, 2005
Paper acceptances announced July 4, 2005
Final camera-ready copy due August 8, 2005
Advance registration September 23, 2005

Author Instructions

Please follow these formatting guidelines to prepare the final camera-ready copy of your paper.

Student Travel Support

Full conference registration was paid for every student who presented a long paper.

Email Kwan-Liu Ma for any question about this Workshop.
Last Modified: November 18, 2005