1. Palo Alto Networks. (2021). PAN-OS® Administrator’s Guide Version 10.1. In the "Application Command Center" (ACC) section
the "Traffic Map" widget is described as a tool to "display the source and destination countries of the traffic on a world map
" which serves to visualize network traffic patterns. This distinguishes it from the "Threat Map
" which specifically visualizes threats. (Reference: Chapter on "ACC" -> "ACC Widgets").
2. Splunk Inc. (2022). Splunk Enterprise Security User Manual. The "Security Posture" dashboard includes panels like "Traffic by Country
" which are used to "summarize the geographic location of traffic on your network." The function is to provide a high-level
visual summary of traffic origins and destinations
not to perform intrinsic threat identification. (Reference: Section on "Security Posture Dashboard Panels").
3. Conti
G.
& Abdullah
K. (2004). Passive Visual Fingerprinting of Network Attack Tools. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. This academic paper discusses the use of visualization for security analysis
establishing that tools like geographical maps provide a high-level view to help analysts "orient themselves" to network activity
which is a precursor to
but distinct from
specific threat identification. (DOI: https://doi.org/10.1145/1029208.1029218
Section 2: Related Work).