Nettimeview: applying spatio-temporal data visualization techniques to ddos attack analysis

A Shrestha, Y Zhu, K Manandhar - … , ISVC 2014, Las Vegas, NV, USA …, 2014 - Springer
Abstract Distributed Denial-Of-Service (DDoS) is a common network attack where multiple
computers attempt to disable a single system with overwhelming network traffic. Various …

[PDF][PDF] Key impediments to DFT-focused test and how to overcome them

K Posse, G Eide - International Test Conference, 2003 - scholar.archive.org
In a carefully structured study spanning several months, the authors visited numerous
companies focused on Design For Test methodologies in SoC Test, Characterization, and …

Visual fusion of multi-source network security data based on labelled treemap

S Zhang, R Shi - International Journal of Networking and …, 2016 - inderscienceonline.com
The security data generated in today's network are large-scaled, heterogeneous, and rapidly
changing. As a result, the traditional methods fail to meet the needs of analysis on the …

[PDF][PDF] Identifying Network Anomalies Using Clustering Technique in Weblog Data

BK Kumar, A Bhaskar - International Journal of Computers & Technology, 2012 - Citeseer
In this paper we present an approach for identifying network anomalies by visualizing
network flow data which is stored in weblogs. Various clustering techniques can be used to …

[PDF][PDF] Assessing the challenges of intrusion detection systems

T Ibrahim, SM Furnell, M Papadaki… - … . Las Vegas, USA (June 2-3 …, 2008 - Citeseer
Abstract Intrusion Detection Systems (IDS) are a commonly recognised element of the
Internet security arsenal, regularly considered alongside firewalls and anti-virus as options …

[图书][B] Scaling and visualizing network data to facilitate in intrusion detection tasks

K Abdullah - 2006 - search.proquest.com
As the trend of successful network attacks continue to rise, better forms of intrusion, detection
and prevention are needed. This thesis addresses network traffic visualization techniques …

Network security data visualization

H Huang, ZY Zhou, AY Liu… - … Conference on Electronic …, 2021 - spiedigitallibrary.org
In the past year of 2020, life in the post-epidemic era continues to move towards cyberspace.
The surge in magnitude and value of data has also brought more data abuse, attacks and …

A unified approach to network traffic and network security visualisation

H Read, A Blyth, I Sutherland - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
In this paper we present an architecture which enables data-sharing between computer
security and network traffic visualisation tools. At its core is a middleware which manages all …

Applications in data-intensive computing

AR Shah, JN Adkins, DJ Baxter, WR Cannon… - Advances in …, 2010 - Elsevier
The total quantity of digital information in the world is growing at an alarming rate. Scientists
and engineers are contributing heavily to this data “tsunami” by gathering data using …

Security visualization infrastructures, techniques, and methodologies for improved enterprise security

FF Özdemir Sönmez - 2019 - open.metu.edu.tr
This thesis focuses on providing designs to allow monitoring of the security status of
enterprises at the organization level. The audience of this research is all enterprise level IT …