HEAP: reliable assessment of BGP hijacking attacks

J Schlamp, R Holz, Q Jacquemart… - IEEE Journal on …, 2016 - ieeexplore.ieee.org
The detection of BGP prefix hijacking attacks has been the focus of research for more than a
decade. However, the state-of-the-art techniques fall short of detecting more elaborate types …

TVi: A visual querying system for network monitoring and anomaly detection

A Boschetti, L Salgarelli, C Muelder… - Proceedings of the 8th …, 2011 - dl.acm.org
Monitoring, anomaly detection and forensics are essential tasks that must be carried out
routinely for every computer network. The sheer volume of data generated by conventional …

BGPfuse: Using visual feature fusion for the detection and attribution of BGP anomalies

S Papadopoulos, G Theodoridis… - Proceedings of the Tenth …, 2013 - dl.acm.org
This paper presents BGPfuse, a scheme for visualizing and exploring BGP (Border Gateway
Protocol) path change anomalies. BGPfuse uses a set of BGP features that are capable of …

Glyph-based generic network visualization

RF Erbacher - Visualization and Data Analysis 2002, 2002 - spiedigitallibrary.org
Network managers and system administrators have an enormous task set before them in this
day of growing network usage. This is particularly true of e-commerce companies and others …

Accurate real-time identification of IP prefix hijacking

X Hu, ZM Mao - 2007 IEEE Symposium on Security and …, 2007 - ieeexplore.ieee.org
We present novel and practical techniques to accurately detect IP prefix hijacking attacks in
real time to facilitate mitigation. Attacks may hijack victim's address space to disrupt network …

Large-scale network monitoring for visual analysis of attacks

F Fischer, F Mansmann, DA Keim, S Pietzko… - … for Computer Security …, 2008 - Springer
The importance of the Internet and our dependency on computer networks are steadily
growing, which results in high costs and substantial consequences in case of successful …

Cybervis: visualizing the potential impact of cyber attacks on the wider enterprise

S Creese, M Goldsmith, N Moffat… - … on Technologies for …, 2013 - ieeexplore.ieee.org
A variety of data-mining tools and filtering techniques exist to detect and analyze cyber-
attacks by monitoring network traffic. In recent years many of these tools use visualization …

Situ: Identifying and explaining suspicious behavior in networks

JR Goodall, ED Ragan, CA Steed… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Despite the best efforts of cyber security analysts, networked computing assets are routinely
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …

[图书][B] Network traffic anomaly detection and prevention: concepts, techniques, and tools

MH Bhuyan, DK Bhattacharyya, JK Kalita - 2017 - books.google.com
This indispensable text/reference presents a comprehensive overview on the detection and
prevention of anomalies in computer network traffic, from coverage of the fundamental …

Visualizing network data for intrusion detection

K Abdullah, C Lee, G Conti… - Proceedings from the …, 2005 - ieeexplore.ieee.org
As the trend of successful network attacks continue to rise, better forms of intrusion detection
and prevention are needed. This paper addresses network traffic visualization techniques …