[PDF][PDF] Processing data to construct practical visualizations for network security

K Abdullah, C Lee, G Conti, J Copeland - Information Assurance …, 2006 - rumint.org
Network vulnerabilities are increasingly rampant despite advances in Intrusion Detection
Systems (IDSs) and Intrusion Prevention Systems (IPSs). Even as funding and work by …

Visualizing network traffic for intrusion detection

JR Goodall - Proceedings of the 6th conference on Designing …, 2006 - dl.acm.org
Intrusion detection, the process of using network data to identify potential attacks, has
become an essential component of information security. Human analysts doing intrusion …

A survey, taxonomy, and analysis of network security visualization techniques

RR Kasemsri - 2006 - scholarworks.gsu.edu
Network security visualization is a relatively new field and is quickly gaining momentum.
Network security visualization allows the display and projection of the network or system …

[图书][B] Security data visualization: graphical techniques for network analysis

G Conti - 2007 - books.google.com
Information overload. If you're responsible for maintaining your network's security, you're
living with it every day. Logs, alerts, packet captures, and even binary files take time and …

[PDF][PDF] Large scale network security visualization

NA Giacobe, VF Mancuso, D Minotra - 2010 - researchgate.net
ABSTRACT Intrusion Detection Systems and other network security tools often provide only
text-based output. Multiple systems are employed by network security analysts, which …

[图书][B] Defending the network: Visualizing network traffic for intrusion detection analysis

JR Goodall - 2007 - search.proquest.com
Intrusion detection, the process of using computer network and system data to identify
potential cyber attacks, has become an increasingly essential component of information …

Flexible web visualization for alert-based network security analytics

L Hao, CG Healey, SE Hutchinson - Proceedings of the Tenth Workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …

[PDF][PDF] FloVis: Leveraging visualization to protect sensitive network infrastructure

J Glanfield, D Paterson, C Smith, T Taylor… - … Panel Symposium on …, 2010 - cs.dal.ca
Computer networks have become critical to NATO operations. Much of NATO's computer
traffic runs over civilian networks, and NATO computers are accessible to a wide variety of …

Computer network visualization [Guest Editorial]

JR Goodall, F Mansmann, J Gerth - IEEE Network, 2012 - ieeexplore.ieee.org
Computer networks are dynamic, growing, and continually evolving. As complexity grows, it
becomes harder to effectively communicate to human decision-makers the results of …

[图书][B] Applying information visualization to computer security applications

RB Whitaker - 2010 - search.proquest.com
This thesis presents two phases of research in applying visualization to network security
challenges. The first phase included discovering the most useful and powerful features in …