Visualizing network data for intrusion detection

K Abdullah, C Lee, G Conti… - Proceedings from the …, 2005 - ieeexplore.ieee.org
As the trend of successful network attacks continue to rise, better forms of intrusion detection
and prevention are needed. This paper addresses network traffic visualization techniques …

Real-time and forensic network data analysis using animated and coordinated visualization

S Krasser, G Conti, J Grizzard… - … from the Sixth …, 2005 - ieeexplore.ieee.org
Rapidly detecting and classifying malicious activity contained within network traffic is a
challenging problem exacerbated by large datasets and functionally limited manual analysis …

Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations

F Mansmann, F Fischer, DA Keim… - Proceedings of the …, 2009 - dl.acm.org
Network security depends heavily on automated Intrusion Detection Systems (IDS) to sense
malicious activity. Unfortunately, IDS often deliver both too much raw information, and an …

[PDF][PDF] Correlation between netflow system and network views for intrusion detection

C Abad, Y Li, K Lakkaraju, X Yin… - Workshop on Link …, 2004 - academia.edu
We present several ways to correlate security events from two applications that visualize the
same underlying data with two distinct views: system and network. Correlation of security …

Visual analysis of network flow data with timelines and event plots

D Phan, J Gerth, M Lee, A Paepcke… - … 2007: Proceedings of the …, 2008 - Springer
This paper describes Isis, a system that uses progressive multiples of timelines and event
plots to support the iterative investigation of intrusions by experienced analysts using …

[HTML][HTML] NetViewer: A Network Traffic Visualization and Analysis Tool.

SS Kim, ALN Reddy - LISA, 2005 - usenix.org
The frequent and large-scale network attacks have led to an increased need for developing
techniques for analyzing network traffic. If efficient analysis tools were available, it could …

[PDF][PDF] A novel visualization technique for network anomaly detection.

IV Onut, B Zhu, AA Ghorbani - PST, 2004 - Citeseer
Visualized information is a technique that can encode large amounts of complex interrelated
data, being at the same time easily quantified, manipulated, and processed by a human …

Portvis: a tool for port-based detection of security events

J McPherson, KL Ma, P Krystosk, T Bartoletti… - Proceedings of the …, 2004 - dl.acm.org
Most visualizations of security-related network data require large amounts of finely detailed,
high-dimensional data. However, in some cases, the data available can only be coarsely …

NetBytes viewer: An entity-based netflow visualization utility for identifying intrusive behavior

T Taylor, S Brooks, J McHugh - … 2007: Proceedings of the Workshop on …, 2008 - Springer
Abstract NetBytes Host Viewer is an interactive visualization tool designed to show the
historical network flow data per port of an individual host machine or subnet on a network …

Visualizing real-time network resource usage

R Blue, C Dunne, A Fuchs, K King… - Visualization for Computer …, 2008 - Springer
We present NetGrok, a tool for visualizing computer network usage in real-time. NetGrok
combines well-known information visualization techniques—overview, zoom & filter, details …