This document discusses using data visualization techniques to analyze network security data and detect cyber attacks. It provides examples of visualizing network traffic data from tcpdump files using Perl scripts and Grace to plot graphs. Specific examples include visualizing a port scan, vulnerability scanner, and wargame traffic to identify anomalous patterns compared to normal traffic baselines. Tools mentioned include tcpdump, Ethereal, EtherApe, and research on visualizing intrusion detection systems, routing anomalies, and worm propagation.