While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauthorized VoIP, file sharing, or criminal botnet activity. Automatic intrusion detection methods can detect a large portion of such misuse, but novel patterns can only be detected by humans. Moreover, interpretation of large amounts of alerts imposes new challenges on the analysts. The goal of this paper is to present the visual analysis system NFlowVis to interactively detect unwanted usage of the network infrastructure either by pivoting NetFlows using lDS a1erts or by specifying usage patterns, such as sets of suspicious port numbers. Thereby, our work focuses on pr...
This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomali...
Today's networks face continuously arising new threats, making analysis of network data for the dete...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
While more and more applications require higher network bandwidth, there is also a tendency that lar...
While more and more applications require higher network bandwidth, there is al-so a tendency that la...
Abstract. The importance of the Internet and our dependency on com-puter networks are steadily growi...
The computers and network services became presence guaranteed in several places. These characteristi...
Networks are forwarding more and more data every year, thus its harder to reveal malicious traffic a...
Netflow data from a large public institution. The data indicate countries and network area from wher...
Today enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
As computer and network technologies evolve, the complexity of cybersecurity has dramatically increa...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
With rising popularity of the internet there is also rising number of people misusing it. This thesi...
To ensure the normal operation of a large computer network system, the common practice is to constan...
AbstractDetecting anomalous or malicious behaviour from NetFlow data alone is a difficult task due m...
This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomali...
Today's networks face continuously arising new threats, making analysis of network data for the dete...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
While more and more applications require higher network bandwidth, there is also a tendency that lar...
While more and more applications require higher network bandwidth, there is al-so a tendency that la...
Abstract. The importance of the Internet and our dependency on com-puter networks are steadily growi...
The computers and network services became presence guaranteed in several places. These characteristi...
Networks are forwarding more and more data every year, thus its harder to reveal malicious traffic a...
Netflow data from a large public institution. The data indicate countries and network area from wher...
Today enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
As computer and network technologies evolve, the complexity of cybersecurity has dramatically increa...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
With rising popularity of the internet there is also rising number of people misusing it. This thesi...
To ensure the normal operation of a large computer network system, the common practice is to constan...
AbstractDetecting anomalous or malicious behaviour from NetFlow data alone is a difficult task due m...
This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomali...
Today's networks face continuously arising new threats, making analysis of network data for the dete...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...