Abstract | ||
---|---|---|
This paper describes our work to develop an environment and novel visualization techniques for the visual representation, exploration, and analysis of network traffic data to ease the identification and analysis of sophisticated attacks above and beyond the ability for traditional network firewalls to detect and block. The visualization techniques are geared towards aiding analysts in filtering unwanted or unneeded data in favor of data deemed more critical and more representative of the sophisticated attacks the analysts must focus their attention on. The environment provides the needed capabilities for analyzing traditional network traffic data without additional filtering, i.e., the environment itself provides the needed capabilities |
Year | DOI | Venue |
---|---|---|
2005 | 10.1109/VIZSEC.2005.5 | VizSEC |
Keywords | Field | DocType |
traditional network firewalls,visual representation,traditional network traffic data,unneeded data,needed capability,sophisticated attack,visualization technique,designing visualization capabilities,novel visualization technique,network traffic data,visualization,intrusion detection,data visualisation,graphical user interfaces | Data mining,Data visualization,Information visualization,Computer security,Visualization,Computer science,Visual analytics,Graphical user interface,Interactive visual analysis,Intrusion detection system,Creative visualization | Conference |
ISBN | Citations | PageRank |
0-7803-9477-1 | 12 | 0.77 |
References | Authors | |
11 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Robert F. Erbacher | 1 | 202 | 27.65 |
Kim Christensen | 2 | 12 | 0.77 |
Amanda Sundberg | 3 | 12 | 0.77 |