
(Schulz, 2011). An early annotated bibliography of
graph drawing algorithms is available from Battista et
al. (Battista et al., 1994).
As mentioned earlier in the paper, the user inter-
face of the Hayshark system is derived from a Hay-
wire Stream Analyzer tool that we had previously de-
veloped for analyzing streaming data in the context
of IoT systems (Taivalsaari, 2024). The earlier Hay-
wire system used a zoomable force-oriented gravity
simulation 3D tree layout as the primary visualization
technique.
The basics of such force-directed gravity visual-
ization algorithms have been presented in the 1980s
and 1990 by Eades and Fruchterman (Eades, 1984),
(Fruchterman and Reingold, 1991). However, when
we shifted our focus to visualizing IPv4 address
spaces, we quickly noticed that unconstrained 3D tree
layouts had a tendency to become very messy as the
number of nodes/addresses in the graph grew larger.
Therefore, we migrated to use more structured di-
rected acyclic graph (DAG) structures as the primary
visualization technique in Hayshark, while the under-
lying gravity simulation principles remain the same.
Related to the creation of zooming user interfaces,
we have a long history in researching and implement-
ing such zooming UI systems ourselves (Smith and
Taivalsaari, 1999), (Taivalsaari, 2008). Based on our
observations, the zooming capabilities can help con-
siderably in investigating the visualized IPv4 address
space at varying levels of detail by making it possible
for the user to interactively ”fly inside” the complex
DAG structure that is rendered dynamically in a 3D
space.
All in all, while none of the individual concepts
behind the Hayshark system are truly novel, the over-
all combination of the features is unique and – more
importantly – very practical.
6 EXPERIENCES AND FUTURE
WORK
As stated earlier in the paper, the Hayshark system
was developed as a ”byproduct” to facilitate the de-
velopment of a commercial 360° live video stream-
ing platform targeting industrial customers. Typical
use cases for that platform include, e.g., remote mon-
itoring and operations in industrial facilities such as
mines, factories and warehouses. It was never our in-
tention to set out and build a tool explicitly for net-
work analysis. However, since we had already ear-
lier built a similar visualization system for analyzing
streaming data in the context of end-to-end IoT sys-
tems, we were aware of the potential of such ”at-a-
glance” visualization tools and realized that the same
principles and practices could be adapted relatively
easily also to network traffic visualization.
At this point, we have not conducted any signifi-
cant user studies with the Hayshark system. As noted
above, our users are commonly utilizing and prefer-
ring it as an ”early notifier” tool that can save efforts
before they start investing a lot of time into more
detailed problem analysis with Wireshark and other
tools. The Hayshark system can also effortlessly pro-
vide information on all the domains from which traf-
fic has been received, and display faults and gener-
ate alerts on various conditions, e.g., related to RTP
streaming issues, sudden spikes in data volumes, and
so on. While none of those features are truly new as
such, together these features serve as a practical com-
bination for various use cases and purposes.
Future work on the Hayshark system will include
more formal user studies as well as various techni-
cal improvements. In the latter area, there are plenty
of low hanging fruit left above and beyond our orig-
inal use cases, including support for visualizing IPv6
traffic as well as visualizing statistics at the more de-
tailed level for particular sender/receiver port combi-
nations. Basically, PCAP packet capture data includes
information from which port on the sender side and
to which port on the receiver side each packet is be-
ing sent; such data could be added as an additional
level/layer in our graph structures. Support for visu-
alizing outbound message traffic could be added as
well. All of these features would be rather trivial to
implement, but so far they have not been high pri-
orities to us since those features were not relevant
in the context of our original target system require-
ments. However, features that are relevant in the con-
text of media streaming systems include support for
analyzing and detecting problems in additional media
streaming protocols. So far, we have been adding new
protocol support on a ”as needed” basis.
We are also looking into additional performance
optimizations on the backend side, since message fre-
quencies and data volumes (both in terms of messages
per second and bytes per second) in media streaming
systems can sometimes be truly massive. This is pre-
cisely why Wireshark and many other tools provide
offline analysis capabilities in which message capture
and analysis can be performed separately instead of
(or in addition to) live analysis. Since the Hayshark
system focuses on interactive network traffic visual-
ization, it is very much in our interest to be able to per-
form live analysis also when receiving tens of thou-
sands of messages per second.
Hayshark: A Web-Based System for Remote Visualization of Network Traffic
531