JR Goodall - Proceedings of the 6th conference on Designing …, 2006 - dl.acm.org
Intrusion detection, the process of using network data to identify potential attacks, has become an essential component of information security. Human analysts doing intrusion …
Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system …
Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and …
ABSTRACT Intrusion Detection Systems and other network security tools often provide only text-based output. Multiple systems are employed by network security analysts, which …
Intrusion detection, the process of using computer network and system data to identify potential cyber attacks, has become an increasingly essential component of information …
L Hao, CG Healey, SE Hutchinson - Proceedings of the Tenth Workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …
J Glanfield, D Paterson, C Smith, T Taylor… - … Panel Symposium on …, 2010 - cs.dal.ca
Computer networks have become critical to NATO operations. Much of NATO's computer traffic runs over civilian networks, and NATO computers are accessible to a wide variety of …
Computer networks are dynamic, growing, and continually evolving. As complexity grows, it becomes harder to effectively communicate to human decision-makers the results of …
This thesis presents two phases of research in applying visualization to network security challenges. The first phase included discovering the most useful and powerful features in …