• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Examples for leverage points
 

Examples for leverage points

on

  • 4,273 views

 

Statistics

Views

Total Views
4,273
Views on SlideShare
4,273
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • What is good about the fact that the Origins and destinations are in two separate maps:- clearly show the flow directions (origin->destination) this is not always obvious in cluttered flow maps- potentially use other appropriate representations for the temporal data without being constrained by having to fit it into a map
  • Like edge bundling, for example,But for us the real challenge is differentWe want to be able to visualize and explore the temporal dimension along with the origins and destinations(embed temporal data into it without adding even more clutter)
  • For Outstanding Creative Design – Spring Rain, a student team from Purdue UniversitySpring Rain was a very interesting concept for Ambient display that shows the important things going on in the network now at a glance without having to do in-depth analysis, which is really key.
  • For Outstanding Creative Design – Solar Wheels, another student team from Purdue University. I should note that both Purdue teams were made up of computer scientists and designersSolar Wheels was very interesting because of the way it used physical navigation to provide an appropriate level of information.
  • SASInteresting Visualization Technique for their integration between two types of matrices
  • From submission:Event 9: Eight suspicious internal hosts and SSH protocol activity from 8:00 April 12th to 5:00 April 15thAt 8:14 April 12th, eight suspicious internal hosts accessed external host 10.4.20.9 which has only appeared once in the log. Beginning from 8:28 April 12th, these eight internal hosts started accessing the port 22 of external host 10.0.3.77 regularly and the accessing number to 10.0.0.4~10.0.0.14 is much larger than that to other workstations. Also, these internal hosts once have accessed 10.1.0.100 and server 172.20.0.3 has accessed 10.0.3.77. Hence these eight internal hosts, 172.10.2.106, 172.10.2.66, 172.10.2.135, 172.20.1.81, 172.20.1.23, 172.20.1.47, 172.30.1.218, 172.30.1.223, are noteworthy (see Figure 9).This screen identifies a correct answer. It finds the command and control communication with the botnet.This solution chose several good cyber to visual mappings and they had the highest overall accuracy.
  • Team had one integrated display. Used entropy calculations to help analyst know where to look. Not a set of separate views but a single display. Mention the award is for outstanding situation awareness because the vises are brought together in one integrated display.

Examples for leverage points Examples for leverage points Presentation Transcript