Abstract
As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Hole, K., Dyrnes, E., Thorsheim, P.: Securing Wi-Fi Networks. Computer 38(7), 28–34 (2005)
Pereira, J.: Breaking The Code: How Credit-Card Data Went Out Wireless Door. Wall Street Journal, 5/4/07 Issue (2007)
PCI Security Standards Council (Accessed 1 June 2008), https://www.pcisecuritystandards.org
NetStumbler (Accessed 1 June 2008), http://www.netstumbler.com
Kismet (Accessed 1 June 2008), http://www.kismetwireless.net
Hurley, C., Thornton, F., Rogers, R., Connelly, D., Baker, B.: WarDriving & Wireless Penetration Testing, pp. 219–246. Syngress Publishing, Inc. (2007)
StumbVerter (Accessed 1 June 2008), http://www.sonar-security.com/sv.html
KNSGEM (Accessed 1 June 2008), http://www.rjpi.com/knsgem.htm
Kismet Earth (Accessed 1 June 2008), http://www.niquille.com/kismet-earth
Bittau, A.: WiFi Exposed, Crossroads, vol. 11(1), p. 3. ACM Press, New York (2004)
Wireless Network Visualization Project (Accessed 1 June 2008), http://www.ittc.ku.edu/wlan
Lentz, C.: 802.11b Wireless Network Visualization and Radiowave Propagation Modeling, Dartmouth College Technical Report TR2003-451 (2003)
Connelly, C., Liu, Y., Bulwinkle, D., Miller, A., Bobbitt, I.: A Toolkit for Automatically Constructing Outdoor Radio Maps. In: International Conference on Information Technology: Coding and Computing (ITCC 2005), vol. II, pp. 248–253 (2005)
Zhou, L., Zygmunt, H.: Securing Ad Hoc Networks, IEEE Networks Special Issue on Network Security. Cornell University, Ithaca (1999)
Department of Defense Directive Number 8100.2 (Accessed 1 June 2008), http://www.dtic.mil/dticasd/sbir/sbir041/srch/n076.pdf
HIPAA Security Standard (Accessed 1 June 2008), http://www.cms.hhs.gov/SecurityStandard
ArcGIS Online (Accessed 1 June 2008), http://www.esri.com/software/arcgis/arcgisonline
Tufte, E.: Envisioning Information, pp. 67–79. Graphics Press (1990)
Eclipse Rich Client Platform (Accessed 1 June 2008), http://eclipse.org/rcp
The Standard Widget Toolkit (SWT) (Accessed 1 June 2008), http://eclipse.org/swt
ArcGIS (Accessed 1 June 2008), http://www.esri.com/software/arcgis
NASA World Wind (Accessed 1 June 2008), http://worldwind.arc.nasa.gov
Heer, J., Card, S.K., Landay, J.A.: Prefuse: A Toolkit For Interactive Information Visualization. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 421–430. ACM Press, New York (2005)
Oracle TopLink Essentials JPA (Accessed 1 June 2008), http://www.oracle.com/technology/products/ias/toplink/jpa/index.html
H2 Database Engine (Accessed 1 June 2008), www.h2database.com
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Prole, K., Goodall, J.R., D’Amico, A.D., Kopylec, J.K. (2008). Wireless Cyber Assets Discovery Visualization. In: Goodall, J.R., Conti, G., Ma, KL. (eds) Visualization for Computer Security. VizSec 2008. Lecture Notes in Computer Science, vol 5210. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85933-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-85933-8_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85931-4
Online ISBN: 978-3-540-85933-8
eBook Packages: Computer ScienceComputer Science (R0)