<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Complex Data Visualized &#187; visualizationComplex Data Visualized</title>
	<atom:link href="http://complexdatavisualized.com/tag/visualization/feed/" rel="self" type="application/rss+xml" />
	<link>http://complexdatavisualized.com</link>
	<description>Survey of interfaces and visualizations of complex networks</description>
	<lastBuildDate>Wed, 26 Nov 2014 21:34:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5</generator>
		<item>
		<title>Raphael Marty on the need for more human eyes in sec monitoring</title>
		<link>http://complexdatavisualized.com/740/</link>
		<comments>http://complexdatavisualized.com/740/#comments</comments>
		<pubDate>Wed, 16 Oct 2013 20:02:50 +0000</pubDate>
		<dc:creator>Johannes Landstorfer</dc:creator>
				<category><![CDATA[related]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[cyber-security]]></category>
		<category><![CDATA[talk]]></category>
		<category><![CDATA[visualization]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=740</guid>
		<description><![CDATA[Raphael Marty spoke at the 2013 (ACM) conference for Knowledge Discovery and Data mining (KDD&#8217;13). It is a very enlightening talk if you want to learn about the status of visualization in computer network security today and core challenges. Ever growing data traffic and persistent problems like false positives in automatic detection cause headaches to network engineers and analysts today, and also Marty admitted often that he has no idea of how to solve them. ...]]></description>
				<content:encoded><![CDATA[<p>Raphael Marty spoke at the 2013 (ACM) conference for Knowledge Discovery and Data mining (<a href="http://www.kdd.org/kdd2013/">KDD&#8217;13</a>). It is a very enlightening talk if you want to learn about the status of visualization in computer network security today and core challenges. Ever growing data traffic and persistent problems like false positives in automatic detection cause headaches to network engineers and analysts today, and also Marty admitted often that he has no idea of how to solve them. As he has worked for IBM, HP/ArcSight, and Splunk, the most prestigious companies in this area, this likely not because of lacking expertise).</p>
<p><iframe width="955" height="716" src="http://www.youtube.com/embed/CEAMF0TaUUU?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p>Marty also generously provided the <a href="http://www.slideshare.net/zrlram/kdd-2013-dm-challenges">slides for his talk</a>.</p>
<p>Some key points I took away:</p>
<h2>Algorithms can&#8217;t cope with targeted or unknown attacks – monitoring needed</h2>
<p>Today&#8217;s attacks are rarely massive or brute force, but targeted, sophisticated, more often nation state sponsored, and low and slow (this is particularly important as it means you can&#8217;t look for typical spikes, which are a sign a mass event – you have to look at long term issues).</p>
<p>Automated tools of today find <em>known</em> threats and work with <em>predefined</em> patterns – they don&#8217;t find unknown attacks (<a href="http://en.wikipedia.org/wiki/Zero-day_attack">0 days</a>) and the more &#8220;heuristic&#8221; tools produce lots of false positives (i.e. increase the workload for analysts instead of reducing it)</p>
<p>According to Gartner <a href="http://www.gartner.com/DisplayDocument?id=2500416">automatic defense systems (prevention) will become entirely useless from in 2020</a>. Instead, you have to monitor and watch out for malicious behaviour (human eyes!), it won&#8217;t be solved automatically.</p>
<p>Some figures for current data amounts in a typical security monitoring setup:</p>
<p><a href="http://complexdatavisualized.com/?attachment_id=741" rel="attachment wp-att-741"><img class="alignnone size-full wp-image-741" alt="marty_detectiontechnology___slideshare-zrlram" src="http://complexdatavisualized.com/wp-content/uploads/2013/10/marty_detectiontechnology___slideshare-zrlram.png" width="1554" height="1014" /></a></p>
<p>So, if everything works out nicely, you still end up with 1000 (highly aggregated/abstracted) alerts that you have to investigate to find the one incident.</p>
<h2>Some security data properties:</h2>
<p><a href="http://complexdatavisualized.com/?attachment_id=742" rel="attachment wp-att-742"><img class="alignnone size-full wp-image-742" alt="marty_securitydata___slideshare-zrlram" src="http://complexdatavisualized.com/wp-content/uploads/2013/10/marty_securitydata___slideshare-zrlram.png" width="1554" height="1014" /></a></p>
<h2>Challenges with data mining methods</h2>
<ul>
<li>Anomaly detection – but how to define &#8220;normal&#8221;?</li>
<li>Association rules – but data is sparse, there&#8217;s little continuity in web traffic</li>
<li>Clustering – no good algorithms available (for categorical data, such as user names, IP addresses)</li>
<li>Classification – data is not consistent (e.g. machine names may change over time)</li>
<li>Summarization – disrespect &#8220;low and slow&#8221; values, which are important</li>
</ul>
<h2>How can visualization help?</h2>
<ol>
<li>make algorithms at work transparent to the user</li>
<li>empower human eyes for understanding, validation, exploration</li>
</ol>
<ul>
<ul>
<li>because they bring</li>
<li>supreme pattern recognition</li>
<li>memory for contexts</li>
<li>intuition!</li>
<li>predictive capabilities</li>
</ul>
</ul>
<p>This is of course a to-do list for our work!</p>
<h2>The need for more research</h2>
<blockquote><p>What is the optimal visualization?</p>
<p>– it depends very much on data at hand and your objectives. But there&#8217;s also very few research on that and I&#8217;m missing that, actually. E.g. what&#8217;s a good visualization for firewall data?</p></blockquote>
<p>And he even shares one of our core problems, the lack of realistic test data:</p>
<blockquote><p>That&#8217;s hard. VAST has some good sets or you can look for cooperations with companies.</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/740/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Inside AT&amp;T Network Operation Center</title>
		<link>http://complexdatavisualized.com/inside-att-network-operation-center/</link>
		<comments>http://complexdatavisualized.com/inside-att-network-operation-center/#comments</comments>
		<pubDate>Sun, 02 Jun 2013 12:01:16 +0000</pubDate>
		<dc:creator>Johannes Landstorfer</dc:creator>
				<category><![CDATA[user needs]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[implementation]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[visualization]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=545</guid>
		<description><![CDATA[Every time we go online, make a phone call, send an SMS, we use the networks of large operators. These are large technical constructions and they need permanent monitoring and maintenance to work as we expect (which is: we don&#8217;t notice they are even there). Network Operations Centers (NOC) are the institutions where network operators concentrate experts and technology to permanently check parameters of the networks, fix problems, and detect malfunctions and malware. Through their ...]]></description>
				<content:encoded><![CDATA[<p>Every time we go online, make a phone call, send an SMS, we use the networks of large operators. These are large technical constructions and they need permanent monitoring and maintenance to work as we expect (which is: we don&#8217;t notice they are even there).</p>
<p><a href="http://en.wikipedia.org/wiki/Network_operations_center" target="_blank">Network Operations Centers</a> (NOC) are the institutions where network operators concentrate experts and technology to permanently check parameters of the networks, fix problems, and detect malfunctions and malware. Through their unique position, these NOCs are usually heavily shielded from the outside world.</p>
<p>This video gives a short <a href="http://www.macworld.com/video/26362/inside-at-t-s-network-operations-center.html" target="_blank">insight into the Global NOC of AT&amp;T</a> (Bedminster, NJ), including a glimpse on their visualisations and an interview with Chuck Kerschner (Director of Network Operations at AT&amp;T).</p>
<div id="attachment_546" style="width:556px;" class="wp-caption alignnone"><a href="http://www.macworld.com/video/26362/inside-at-t-s-network-operations-center.html" target="_blank" rel="attachment wp-att-546"><img class="size-full wp-image-546" alt="Friedmann and Kerschner in front of the video wall of the AT&amp;T GNOC (click image for video)" src="http://complexdatavisualized.com/wp-content/uploads/2013/06/att-gnoc___techhive-com.png" width="556" height="306" /></a><span class="wp-caption-text">Friedmann and Kerschner in front of the video wall of the AT&amp;T GNOC</span></div>
<p>Although Lex Friedman of TechHive asks the &#8220;right questions&#8221; (i.e. the questions we have as well), the answers are often a bit short and too general to learn a lot from them. Still, an interesting video for inspiration.</p>
<div id="attachment_549" style="width:864px;" class="wp-caption alignnone"><a href="http://complexdatavisualized.com/?attachment_id=549" rel="attachment wp-att-549"><img class=" wp-image-549 " alt="View on the large shared dashboard at AT&amp;T (in the video at 1:20)" src="http://complexdatavisualized.com/wp-content/uploads/2013/06/att-gnoc-dashboard___techhive-com.png" width="864" height="540" /></a><span class="wp-caption-text">View on the large shared dashboard at AT&amp;T (in the video at 1:20)</span></div>
<p>A little more detais are availble here as <a href="http://www.bootcamp.com/interview.jsp?interviewId=169" target="_blank">audio</a>, and in an WSJ article about a <a href="http://online.wsj.com/article/SB114610182322237181.html" target="_blank">specialist working at AT&amp;T</a> to prepare for unusual traffic spikes.</p>
<p>Even closer to the SASER/Siegfried project are (Information) <a href="http://en.wikipedia.org/wiki/Information_security_operations_center" target="_blank">Security Operations Centers</a> (SOCs) &#8211; note that Kerschner is mostly concerned with storms or technical outages, not with security threats like viruses or botnets. Steve Roderick is the colleague at the AT&amp;T center <a href="http://www.govtech.com/featured/Worlds-Largest-Telcom-Manages-Network-PHOTOSVIDEO.html" target="_blank">responsible for security</a>.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/inside-att-network-operation-center/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google+ Ripples</title>
		<link>http://complexdatavisualized.com/google-ripples/</link>
		<comments>http://complexdatavisualized.com/google-ripples/#comments</comments>
		<pubDate>Thu, 18 Apr 2013 13:41:51 +0000</pubDate>
		<dc:creator>Jan-Erik Stange</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[hierarchy]]></category>
		<category><![CDATA[infosthetics]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[social network]]></category>
		<category><![CDATA[tree]]></category>
		<category><![CDATA[visualization]]></category>
		<category><![CDATA[web]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=460</guid>
		<description><![CDATA[Google+ Ripples is a visualization of the spread of public posts in the social network Google+. Signed-up members of Google+ can select any public post and have a look at the spread of the post through the network. Only reposts that are set to public are shown in this visualization, so the visualization doesn&#8217;t show the reposts of people in their private circles. The selected post is shown in the middle of the visualization. Reposts ...]]></description>
				<content:encoded><![CDATA[<p><iframe width="955" height="537" src="http://www.youtube.com/embed/_j0I1a_Aw4g?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p>Google+ Ripples is a visualization of the spread of public posts in the social network Google+. Signed-up members of Google+ can select any public post and have a look at the spread of the post through the network. Only reposts that are set to <em>public</em> are shown in this visualization, so the visualization doesn&#8217;t show the reposts of people in their private circles.<br />
The selected post is shown in the middle of the visualization. Reposts are represented by circles labeled with the person&#8217;s name that shared the post. Arrows show which person shared which post. If a shared post is shared again, the shared&#8217;s post circle becomes bigger. The spread of a message over time can be observed by using the timeline slider at the bottom of the diagram. It is also possible to zoom into diagram, which becomes very helpful when looking at posts that were reposted a lot of times.<br />
The circles have different colors assigned, though it is not clear to me, what these are expressing.</p>
<p>I think generally this is an interesting approach of visualizing &#8220;contagion&#8221; in a network. It clearly identifies people that are more &#8220;contagious&#8221; than other people, which could be explained by these people having more social ties in the social network, having something like a leadership role or it could just mean that these people&#8217;s friends are more interested in the topic than other people&#8217;s friends that didn&#8217;t reshare their post. The zoomable user interface is a good way of providing focus and context by interaction. It allows for quite large numbers of elements to be displayed hiding detail information when it is zoomed out, providing more and more information with every zoom-in step.<br />
Some aspects of the interface are worth discussing: For example, why do the circles of reshared posts have to be that large taking away a lot of space? Posts that reshare a post don&#8217;t necessarily have to be inside the circle. Also the interface could show all the reposts including the privately shared without providing the name of the sharing person.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/google-ripples/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Stanford Dissertation Browser</title>
		<link>http://complexdatavisualized.com/stanford-dissertation-browser/</link>
		<comments>http://complexdatavisualized.com/stanford-dissertation-browser/#comments</comments>
		<pubDate>Wed, 03 Apr 2013 14:13:13 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[graph]]></category>
		<category><![CDATA[infosthetics]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[science]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[visualization]]></category>
		<category><![CDATA[web]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=410</guid>
		<description><![CDATA[The Stanford Dissertation Browser is an interactive tool to explore similarities between different fields of study at Stanford University by examining the language used in the different PhD publications. Fields of study are arranged around a circle with one field of study in the centre. For the subject in the centre similarities with other fields are shown by the distance to the centre. The closer the circles, the more common the language these fields share. ...]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-416" alt="Stanford-Dissertation-Browser-electrical-engineering-625x608" src="http://complexdatavisualized.com/wp-content/uploads/2013/04/Stanford-Dissertation-Browser-electrical-engineering-625x608.png" width="625" height="608" />The <a href="http://nlp.stanford.edu/projects/dissertations/browser.html">Stanford Dissertation Browser</a> is an interactive tool to explore similarities between different fields of study at Stanford University by examining the language used in the different PhD publications. Fields of study are arranged around a circle with one field of study in the centre. For the subject in the centre similarities with other fields are shown by the distance to the centre. The closer the circles, the more common the language these fields share.</p>
<p>For example, if you select <em>Electrical Engineering</em> the field <em>Computational Science</em> will move close to the centre, which is not a big surprise. When selecting <em>Music</em>, however, <em>Computational Science</em> also moves very close to the centre. Something you might not expect, at least not to this degree. With a slider at the bottom different years can be selected. The different years are shown all the time in the diagram by very subtle grey circles, which display year and field of study, if you hover over them. In this way you get an overview over the distribution over time and can get more details by moving the timeline slider to select specific years.</p>
<p>This way of visualizing a network is similar to the method the research group <em>Research on Complex Systems</em> at <em>Northwestern University</em> used in their <a title="Visualizing connectivity of airports during Eyjafjallajökull eruption" href="http://complexdatavisualized.com/?p=399">visualization of the structural change in the international flight network</a>. In a similar manner, one particular node was put into focus, surrounding nodes being closer to this node when these two nodes were strongly connected by many links. The same ist the case with the different fields of study. The more words they share, the more connections or links are there between these fields, moving them closer together.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/stanford-dissertation-browser/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Visualizing connectivity of airports during Eyjafjallajökull eruption</title>
		<link>http://complexdatavisualized.com/visualizing-connectivity-of-airports-during-eyjafjallajokull-eruption/</link>
		<comments>http://complexdatavisualized.com/visualizing-connectivity-of-airports-during-eyjafjallajokull-eruption/#comments</comments>
		<pubDate>Wed, 03 Apr 2013 12:41:08 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[diagram]]></category>
		<category><![CDATA[graph]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[network science]]></category>
		<category><![CDATA[science]]></category>
		<category><![CDATA[traffic]]></category>
		<category><![CDATA[visualization]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=399</guid>
		<description><![CDATA[The Engineering Sciences and Applied Mathematics department at Northwestern University hosts several research projects that deal with complex networks. One of these projects deals with the effect of the ash cloud covering Europe in April 2010 for several days. The reaearch group tried to shed light on the question in what way the event has changed the structure of the complex network that is formed by the flight connections by all the airports around the ...]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-406" alt="Eyjafjalljökull2" src="http://complexdatavisualized.com/wp-content/uploads/2013/04/Eyjafjalljökull2.png" width="644" height="644" /> The <a href="http://rocs.northwestern.edu/">Engineering Sciences and Applied Mathematics department</a> at Northwestern University hosts several research projects that deal with complex networks. <a href="http://rocs.northwestern.edu/projects/resilience/eyjafjallajokull.html">One of these projects</a> deals with the effect of the ash cloud covering Europe in April 2010 for several days. The reaearch group tried to shed light on the question in what way the event has changed the structure of the complex network that is formed by the flight connections by all the airports around the world. The way they did this was not by looking at the overall topology of the network, but rather by looking at single nodes, the different airports, and calculating their <em>shortest-path length</em> before and after the eruption. The <em>shortest path</em> doesn&#8217;t describe the geographical distance between two airports, but rather the connectivity between them. So the more flights occur between two airports, the shorter is its path.</p>
<p>These calculations are shown in a special kind of circular before-after diagrams with one particular airport in the centre of a red circle surrounded by dots that represent all the airports that are connected. It is not clear what exactly the red circle describes. According to the website it is the &#8220;approximate distance of the world from Atlanta&#8221;. However, it is clearly some kind of threshold. Looking at Atlanta airport before the event we can see that there are several airports within the red circle, mostly North-American, but also some big others like Frankfurt, London or Hongkong. After the event, however, these have been pushed out of the circle, while in general most of the other nodes have been pushed further away from the circle, thus increasing their <em>shortest-path length</em>.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/visualizing-connectivity-of-airports-during-eyjafjallajokull-eruption/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fighters in a Patent War</title>
		<link>http://complexdatavisualized.com/fighters-in-a-patent-war/</link>
		<comments>http://complexdatavisualized.com/fighters-in-a-patent-war/#comments</comments>
		<pubDate>Wed, 03 Apr 2013 11:02:07 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[economics]]></category>
		<category><![CDATA[infosthetics]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[New York Times]]></category>
		<category><![CDATA[visualization]]></category>
		<category><![CDATA[web]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=391</guid>
		<description><![CDATA[This network visualization by the New York Times shows patent suits of the ten biggest actors (like Apple, Samsung, Motorola etc.) in the mobile phone market. Suits between these ten companies are represented by orange arrows, while suits against one of the ten companies by other parties are colored grey and suits of one company against other parties have a blue color. These other parties are not more specifically detailed. The total amount of different ...]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.nytimes.com/interactive/2012/10/08/business/Fighters-in-a-Patent-War.html?_r=0"><img class="alignnone size-full wp-image-396" alt="PatentWars" src="http://complexdatavisualized.com/wp-content/uploads/2013/04/PatentWars.png" width="481" height="409" />This network visualization</a> by the New York Times shows patent suits of the ten biggest actors (like Apple, Samsung, Motorola etc.) in the mobile phone market. Suits between these ten companies are represented by orange arrows, while suits against one of the ten companies by other parties are colored grey and suits of one company against other parties have a blue color. These other parties are not more specifically detailed. The total amount of different arrows one company has are arranged in a circle with the effect that the cirle becomes bigger, the more incoming or outgoing suits one company has.</p>
<p>This visualization caught my attention primarily because of the arrangement of the arrows. Thinking of computer networks different segments of the circle could visually encode different ports and their connections in a network. Further research is needed to investigate, if this might prove helpful for security administrators.<br />
Also, for such a visualization it might be more revealing to put more emphasis on the direction of the connections, e.g. by color. Differentiating the direction only by the little arrowhead, as we can observe in the New York Times graphic is a little hard to recognize. For applications such as monitoring a network these kinds of weak differentiations are not enough.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/fighters-in-a-patent-war/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Power Rank</title>
		<link>http://complexdatavisualized.com/the-power-rank/</link>
		<comments>http://complexdatavisualized.com/the-power-rank/#comments</comments>
		<pubDate>Tue, 12 Mar 2013 13:12:50 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[diagram]]></category>
		<category><![CDATA[hierarchy]]></category>
		<category><![CDATA[infosthetics]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[tree]]></category>
		<category><![CDATA[visualization]]></category>
		<category><![CDATA[web]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=372</guid>
		<description><![CDATA[The Power Rank is a visualization of the chances of winning for all the basketball teams participating in the NCAA Tournament. The teams are organized around a circle grouped by the region they are from. In the center of the circle you can see all the games of the tournament represented by dots. These are connected to the different teams that could possibly take part in the game. When hovering over these dots, the teams ...]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-385" alt="ThePowerNode" src="http://complexdatavisualized.com/wp-content/uploads/2013/03/ThePowerNode.png" width="560" height="438" /></p>
<p><a href="http://thepowerrank.com/visual/NCAA_Tournament_Predictions">The Power Rank</a> is a visualization of the chances of winning for all the basketball teams participating in the NCAA Tournament. The teams are organized around a circle grouped by the region they are from. In the center of the circle you can see all the games of the tournament represented by dots. These are connected to the different teams that could possibly take part in the game. When hovering over these dots, the teams get highlighted  and the probability of being the winner of this particular game is shown at the team&#8217;s label with a percentage value. You can also hover over particular teams to show what the corresponding chances of winning are in the different games leading to the final (which is the dot in the middle).</p>
<p>This visualization is rather uncommon in that it shows a hierarchy in the middle of the circle with a treelike structure. Of course this is a visualization that can handle only a certain amount of data because the space is limited by the circle.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/the-power-rank/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Log Visualization with a Correlation Engine</title>
		<link>http://complexdatavisualized.com/security-log-visualization-with-a-correlation-engine/</link>
		<comments>http://complexdatavisualized.com/security-log-visualization-with-a-correlation-engine/#comments</comments>
		<pubDate>Thu, 07 Feb 2013 17:39:48 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[talk]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[visualization]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=224</guid>
		<description><![CDATA[On the 28th Chaos Communication Congress organized by Chaos Computer Club in Berlin, network security specialist Chris Kubecka talks about how correlation and visualization of network log data from different devices can support the process of finding potential threats and malware. Usually a network is comprised of a variety of different devices that each generates log files in its own format. Having a separate console for each of these devices]]></description>
				<content:encoded><![CDATA[<p><iframe width="955" height="537" src="http://www.youtube.com/embed/1ITnxWuBKnk?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p>On the <a href="http://events.ccc.de/congress/2011/wiki/Welcome">28th Chaos Communication Congress</a> organized by Chaos Computer Club in Berlin, network security specialist Chris Kubecka talks about how correlation and visualization of network log data from different devices can support the process of finding potential threats and malware. Usually a network is comprised of a variety of different devices that each generates log files in its own format. Having a separate console for each of these devices</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/security-log-visualization-with-a-correlation-engine/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>HP Enterprise Security Products and ArcSight</title>
		<link>http://complexdatavisualized.com/hp-enterprise-security-products-and-arcsight/</link>
		<comments>http://complexdatavisualized.com/hp-enterprise-security-products-and-arcsight/#comments</comments>
		<pubDate>Tue, 05 Feb 2013 18:50:42 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[SIEM]]></category>
		<category><![CDATA[commercial]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[graph]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[visualization]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=131</guid>
		<description><![CDATA[In their business unit ESP (Enterprise Security Products) Hewlett Packard offers several security tools in three different areas: Application Security (Fortify), Information Security (ArcSight) and Network and Cloud Security (Tipping Point). While Fortify is targeted at software security, ArcSight can be considered a SIEM (Security Information and Event Management) system. TippingPoint is a defense system against cyber attacks and threats. According to Gardner ArcSight can be considered as one of the leaders in the field ...]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-large wp-image-142" alt="ArcSight ESM Dashboard" src="http://complexdatavisualized.com/wp-content/uploads/2013/02/ArcSight-ESM-Dashboard-1024x469.png" width="1024" height="469" />In their business unit <a href="http://www8.hp.com/us/en/software-solutions/software.html?compURI=1214365#">ESP</a> (Enterprise Security Products) Hewlett Packard offers several security tools in three different areas: Application Security (Fortify), Information Security (ArcSight) and Network and Cloud Security (Tipping Point). While Fortify is targeted at software security, ArcSight can be considered a SIEM (Security Information and Event Management) system. TippingPoint is a defense system against cyber attacks and threats.<br />
<a href="http://www.gartner.com/technology/reprints.do?id=1-1ANUJF3&amp;ct=120525&amp;st=sb">According to Gardner</a> ArcSight can be considered as one of the leaders in the field of SIEMs. There are different ArcSight SIEM solutions available depending, if you are  interested in recording and analyzing log information or if you are focussing on real-time security events. The choice for one of the solutions is also dependent on the size of your network.</p>
<p>Though ArcSight is one of the most popular products on the market on the market it has its shortcomings:</p>
<blockquote><p>&#8220;ArcSight Enterprise Security Manager is complex in terms of deployment and performance management.&#8221;</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/hp-enterprise-security-products-and-arcsight/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CNN Ecosphere</title>
		<link>http://complexdatavisualized.com/cnn-ecosphere/</link>
		<comments>http://complexdatavisualized.com/cnn-ecosphere/#comments</comments>
		<pubDate>Tue, 29 Jan 2013 17:07:20 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[infosthetics]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[tree]]></category>
		<category><![CDATA[visualization]]></category>
		<category><![CDATA[web]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=124</guid>
		<description><![CDATA[The CNN Ecosphere is an interactive visualization of tweets about the COP17 Conference on Climate Change in Durban, South Africa. Tweets with the hashtag #COP17 are organized in threedimensional trees around a globe. The different discussed topics are split into different trees with each tweet being a leaf in the tree. Depending on how the discussion develops over time, growth in the trees is stimulated more or less. By clicking and dragging the globe and ...]]></description>
				<content:encoded><![CDATA[<p>The <a href="http://cnn-ecosphere.com/cop17/">CNN Ecosphere</a> is an interactive visualization of tweets about the COP17 Conference on Climate Change in Durban, South Africa. Tweets with the hashtag #COP17 are organized in threedimensional trees around a globe. The different discussed topics are split into different trees with each tweet being a leaf in the tree. Depending on how the discussion develops over time, growth in the trees is stimulated more or less. By clicking and dragging the globe and the trees can be turned around. There is a timeline slider at the bottom to select a certain day in the past. Also, Different topics can be selected at the bottom. Clicking them automatically zooms in to these trees. When a tree is zoomed in, the each tweet can be read by hovering over the leaves.<br />
While the visualization is quite impressive and beautiful, the interface is very limited and the overall performance of the app is rather slow.</p>
<p><img class="alignnone size-large wp-image-127" alt="ecosphere 1" src="http://complexdatavisualized.com/wp-content/uploads/2013/01/ecosphere-1-1024x534.png" width="1024" height="534" /></p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/cnn-ecosphere/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
