A systematic review of defensive and offensive cybersecurity with machine learning

ID Aiyanyo, H Samuel, H Lim - Applied Sciences, 2020 - mdpi.com
This is a systematic review of over one hundred research papers about machine learning
methods applied to defensive and offensive cybersecurity. In contrast to previous reviews …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Temporal MDS plots for analysis of multivariate data

D Jäckle, F Fischer, T Schreck… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Multivariate time series data can be found in many application domains. Examples include
data from computer networks, healthcare, social networks, or financial markets. Often …

Visualizing big network traffic data using frequent pattern mining and hypergraphs

E Glatz, S Mavromatidis, B Ager, X Dimitropoulos - Computing, 2014 - Springer
Visualizing communication logs, like NetFlow records, is extremely useful for numerous
tasks that need to analyze network traffic traces, like network planning, performance …

Security in process: Visually supported triage analysis in industrial process data

AP Lohfink, SDD Anton, HD Schotten… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Operation technology networks, ie hard-and software used for monitoring and controlling
physical/industrial processes, have been considered immune to cyber attacks for a long …

ENTVis: A visual analytic tool for entropy-based network traffic anomaly detection

F Zhou, W Huang, Y Zhao, Y Shi… - … computer graphics and …, 2015 - ieeexplore.ieee.org
Entropy-based traffic metrics have received substantial attention in network traffic anomaly
detection because entropy can provide fine-grained metrics of traffic distribution …

Visual analytics of anomalous user behaviors: A survey

Y Shi, Y Liu, H Tong, J He, G Yan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the pervasive use of information technologies, the increasing availability of data
provides new opportunities for understanding user behaviors. Unearthing anomalies in user …

Anomaly detection for cloud monitoring

H Leung, S Chen - US Patent 8,868,474, 2014 - Google Patents
Technologies are presented for anomaly detection in a cloud environment using a sparsity
measure. In some examples, cloud metric data may be gathered and processed into a …

Evaluating visualization approaches to detect abnormal activities in network traffic data

SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …

Visualizing traffic causality for analyzing network anomalies

H Zhang, M Sun, D Yao, C North - Proceedings of the 2015 ACM …, 2015 - dl.acm.org
Monitoring network traffic and detecting anomalies are essential tasks that are carried out
routinely by security analysts. The sheer volume of network requests often makes it difficult …