Visual Firewall Log Analysis – At the Border Between Analytical and Appealing

09/08/2022
by   Marija Schufrin, et al.
0

In this paper, we present our design study on developing an interactive visual firewall log analysis system in collaboration with an IT service provider. We describe the human-centered design process, in which we additionally considered hedonic qualities by including the usage of personas, psychological need cards and interaction vocabulary. For the problem characterization we especially focus on the demands of the two main clusters of requirements: high-level overview and low-level analysis, represented by the two defined personas, namely information security officer and network analyst. This resulted in the prototype of a visual analysis system consisting of two interlinked parts. One part addresses the needs for rather strategical tasks while also fulfilling the need for an appealing appearance and interaction. The other part rather addresses the requirements for operational tasks and aims to provide a high level of flexibility. We describe our design journey, the derived domain tasks and task abstractions as well as our visual design decisions, and present our final prototypes based on a usage scenario. We also report on our capstone event, where we conducted an observed experiment and collected feedback from the information security officer. Finally, as a reflection, we propose the extension of a widely used design study process with a track for an additional focus on hedonic qualities.

READ FULL TEXT

page 1

page 3

page 5

page 6

page 7

page 8

research
09/04/2023

A Survey for Graphic Design Intelligence

Graphic design is an effective language for visual communication. Using ...
research
07/12/2023

Exploring Millions of User Interactions with ICEBOAT: Big Data Analytics for Automotive User Interfaces

User Experience (UX) professionals need to be able to analyze large amou...
research
11/29/2018

Inviwo - A Visualization System with Usage Abstraction Levels

The complexity of today's visualization applications demands specific vi...
research
09/03/2020

Exploratory Analysis of File System Metadata for Rapid Investigation of Security Incidents

Investigating cybersecurity incidents requires in-depth knowledge from t...
research
12/17/2018

Traceability of Deep Neural Networks

[Context.] The success of deep learning makes its usage more and more te...
research
09/29/2018

Pulse: Toward a Smart Campus by Communicating Real-time Wi-Fi Access Data

To enhance the mobility and convenience of the campus community, we desi...

Please sign up or login with your details

Forgot password? Click here to reset