A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Surveying port scans and their detection methodologies

MH Bhuyan, DK Bhattacharyya… - The Computer …, 2011 - academic.oup.com
Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port
scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is …

Neural visualization of network traffic data for intrusion detection

E Corchado, Á Herrero - Applied Soft Computing, 2011 - Elsevier
This study introduces and describes a novel intrusion detection system (IDS) called
MOVCIDS (mobile visualization connectionist IDS). This system applies neural projection …

An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities

A Karami - Expert Systems with Applications, 2018 - Elsevier
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and
visualization techniques has considerably become an important research topic to protect …

网络安全数据可视化综述

赵颖, 樊晓平, 周芳芳, 汪飞, 张加万 - 计算机辅助设计与图形学学报, 2014 - jcad.cn
网络安全可视化是一个新兴的交叉研究领域, 它通过提供交互式可视化工具,
提升网络安全分析人员感知, 分析和理解网络安全问题的能力. 通过近些年来的研究 …

A survey of network anomaly visualization

T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
Network anomaly analysis is an emerging subtopic of network security. Network anomaly
refers to the unusual behavior of network devices or suspicious network status. A number of …

Real-time visualization of network behaviors for situational awareness

DM Best, S Bohn, D Love, A Wynne… - Proceedings of the seventh …, 2010 - dl.acm.org
Plentiful, complex, and dynamic data make understanding the state of an enterprise network
difficult. Although visualization can help analysts understand baseline behaviors in network …

Contextual information fusion for intrusion detection: a survey and taxonomy

A Aleroud, G Karabatis - Knowledge and Information Systems, 2017 - Springer
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means
an easy task. One particular limitation of existing research originates from the uncertainty of …

Detecting malicious logins in enterprise networks using visualization

H Siadati, B Saket, N Memon - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Enterprise networks have been a frequent target of data breaches and sabotage. In a widely
used method, attackers establish a foothold in the target network by compromising a single …