[PDF][PDF] Simplified Network Traffic Visualization for Real-Time Security Analysis

M Dean, L Vespa - Proceedings of the International Conference on …, 2013 - world-comp.org
Although traditional methods of network security analysis used in investigating network
traffic and log files are essential to mitigating malicious network activity, these methods …

A survey of network traffic visualization in detecting network security threats

X Liu, Y Sun, L Fang, J Liu, L Yu - … 2014, Beijing, China, November 28-29 …, 2015 - Springer
Analyzing network traffic to detect network security threats has drawn attentions from security
researchers for decades. However, the new characteristics of network traffic, such as …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

[PDF][PDF] NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data.

J Nicholls, D Peters, A Slawinski, T Spoor, S Vicol… - TPCG, 2013 - academia.edu
Computer network traffic visualizations deliver improved understanding of pattern-of-life for
networks, and such enhanced awareness can facilitate the detection of malicious traffic …

[PDF][PDF] Internet security visualization case study: Instrumenting a network for NetFlow security visualization tools

W Yurcik, Y Li - 21st Annual Computer Security Applications …, 2005 - researchgate.net
With the development of the Internet and organizational intranets, it has become an
increasingly critical and difficult task to monitor large and complex networks-indispensable …

FloVis: a network security visualization framework

T Taylor - 2009 - library-archives.canada.ca
Security analysts examine gigabytes of network data on a daily basis looking for signs of
intrusive behaviour. Command-line tools such as the System for Internet-Level Knowledge …

[图书][B] Applied security visualization

R Marty - 2008 - dl.acm.org
APPLIED SECURITY VISUALIZATION Collecting log data is one thing, having relevant
information is something else. The art to transform all kinds of log data into meaningful …

Home-centric visualization of network traffic for security administration

R Ball, GA Fink, C North - Proceedings of the 2004 ACM workshop on …, 2004 - dl.acm.org
Today's system administrators, burdened by rapidly increasing network activity, must quickly
perceive the security state of their networks, but they often have only text-based tools to work …

Evaluating visualization approaches to detect abnormal activities in network traffic data

SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …

Real-time and forensic network data analysis using animated and coordinated visualization

S Krasser, G Conti, J Grizzard… - … from the Sixth …, 2005 - ieeexplore.ieee.org
Rapidly detecting and classifying malicious activity contained within network traffic is a
challenging problem exacerbated by large datasets and functionally limited manual analysis …