Network and service management encompasses a set of activities, methods, procedures, and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is …
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile visualization connectionist IDS). This system applies neural projection …
A Karami - Expert Systems with Applications, 2018 - Elsevier
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techniques has considerably become an important research topic to protect …
T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of …
DM Best, S Bohn, D Love, A Wynne… - Proceedings of the seventh …, 2010 - dl.acm.org
Plentiful, complex, and dynamic data make understanding the state of an enterprise network difficult. Although visualization can help analysts understand baseline behaviors in network …
A Aleroud, G Karabatis - Knowledge and Information Systems, 2017 - Springer
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means an easy task. One particular limitation of existing research originates from the uncertainty of …
Enterprise networks have been a frequent target of data breaches and sabotage. In a widely used method, attackers establish a foothold in the target network by compromising a single …