Skip to main content

Wireless Cyber Assets Discovery Visualization

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5210))

Abstract

As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hole, K., Dyrnes, E., Thorsheim, P.: Securing Wi-Fi Networks. Computer 38(7), 28–34 (2005)

    Article  Google Scholar 

  2. Pereira, J.: Breaking The Code: How Credit-Card Data Went Out Wireless Door. Wall Street Journal, 5/4/07 Issue (2007)

    Google Scholar 

  3. PCI Security Standards Council (Accessed 1 June 2008), https://www.pcisecuritystandards.org

  4. NetStumbler (Accessed 1 June 2008), http://www.netstumbler.com

  5. Kismet (Accessed 1 June 2008), http://www.kismetwireless.net

  6. Hurley, C., Thornton, F., Rogers, R., Connelly, D., Baker, B.: WarDriving & Wireless Penetration Testing, pp. 219–246. Syngress Publishing, Inc. (2007)

    Google Scholar 

  7. StumbVerter (Accessed 1 June 2008), http://www.sonar-security.com/sv.html

  8. KNSGEM (Accessed 1 June 2008), http://www.rjpi.com/knsgem.htm

  9. Kismet Earth (Accessed 1 June 2008), http://www.niquille.com/kismet-earth

  10. Bittau, A.: WiFi Exposed, Crossroads, vol. 11(1), p. 3. ACM Press, New York (2004)

    Google Scholar 

  11. Wireless Network Visualization Project (Accessed 1 June 2008), http://www.ittc.ku.edu/wlan

  12. Lentz, C.: 802.11b Wireless Network Visualization and Radiowave Propagation Modeling, Dartmouth College Technical Report TR2003-451 (2003)

    Google Scholar 

  13. Connelly, C., Liu, Y., Bulwinkle, D., Miller, A., Bobbitt, I.: A Toolkit for Automatically Constructing Outdoor Radio Maps. In: International Conference on Information Technology: Coding and Computing (ITCC 2005), vol. II, pp. 248–253 (2005)

    Google Scholar 

  14. Zhou, L., Zygmunt, H.: Securing Ad Hoc Networks, IEEE Networks Special Issue on Network Security. Cornell University, Ithaca (1999)

    Google Scholar 

  15. Department of Defense Directive Number 8100.2 (Accessed 1 June 2008), http://www.dtic.mil/dticasd/sbir/sbir041/srch/n076.pdf

  16. HIPAA Security Standard (Accessed 1 June 2008), http://www.cms.hhs.gov/SecurityStandard

  17. ArcGIS Online (Accessed 1 June 2008), http://www.esri.com/software/arcgis/arcgisonline

  18. Tufte, E.: Envisioning Information, pp. 67–79. Graphics Press (1990)

    Google Scholar 

  19. Eclipse Rich Client Platform (Accessed 1 June 2008), http://eclipse.org/rcp

  20. The Standard Widget Toolkit (SWT) (Accessed 1 June 2008), http://eclipse.org/swt

  21. ArcGIS (Accessed 1 June 2008), http://www.esri.com/software/arcgis

  22. NASA World Wind (Accessed 1 June 2008), http://worldwind.arc.nasa.gov

  23. Heer, J., Card, S.K., Landay, J.A.: Prefuse: A Toolkit For Interactive Information Visualization. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 421–430. ACM Press, New York (2005)

    Google Scholar 

  24. Oracle TopLink Essentials JPA (Accessed 1 June 2008), http://www.oracle.com/technology/products/ias/toplink/jpa/index.html

  25. H2 Database Engine (Accessed 1 June 2008), www.h2database.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

John R. Goodall Gregory Conti Kwan-Liu Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Prole, K., Goodall, J.R., D’Amico, A.D., Kopylec, J.K. (2008). Wireless Cyber Assets Discovery Visualization. In: Goodall, J.R., Conti, G., Ma, KL. (eds) Visualization for Computer Security. VizSec 2008. Lecture Notes in Computer Science, vol 5210. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85933-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85933-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85931-4

  • Online ISBN: 978-3-540-85933-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics