To ensure the normal operation of a large computer network system, the common practice is to constantly collect system logs and analyze the network activities for detecting anomalies. Most of the analysis methods in use today are highly automated due to the enormous size of the collected data. Conventional automated methods are largely based on statistical modeling, and some employ machine learning. In this paper, we show interactive visualization as an alternative and effective data exploration method for understanding the complex behaviors of computer network systems. We describe three log-file analysis applications, and demonstrate how the use of our visualization-centered tools can lead to the discovery of flaws and intruders in the net...
The flood of raw data generated by intrusion detection and other network monitoring devices can be s...
Personal machines are often the weakest points within a large network. Although they run an ever-inc...
Network communication has become indispensable in business, education, and government. With the perv...
Figure 1: The overview of web-based visualization tool for analyzing the network and system anomalie...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Today enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
The Internet has become a dangerous place: malicious code gets spread on personal comput-ers across ...
Despite several years of intensive study, intrusion detection systems still suffer from a key defici...
Network security visualization is a relatively new field and is quickly gaining momentum. Network se...
Network log files often need to be investigated manually for suspicious activity. The huge amount of...
The Internet pervades many aspects of our lives and is becoming indispensable to critical functions ...
Identifying anomalies in network traffic logs is a very challenging task for a network analyst. With...
Network security depends heavily on automated Intrusion Detection Systems (IDS) to sense malicious a...
We created a pixel map for multivariate data based on an analysis of the needs of network security e...
Abstract—Network forensics is the critical next step in the analysis of network attacks, intrusions,...
The flood of raw data generated by intrusion detection and other network monitoring devices can be s...
Personal machines are often the weakest points within a large network. Although they run an ever-inc...
Network communication has become indispensable in business, education, and government. With the perv...
Figure 1: The overview of web-based visualization tool for analyzing the network and system anomalie...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Today enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
The Internet has become a dangerous place: malicious code gets spread on personal comput-ers across ...
Despite several years of intensive study, intrusion detection systems still suffer from a key defici...
Network security visualization is a relatively new field and is quickly gaining momentum. Network se...
Network log files often need to be investigated manually for suspicious activity. The huge amount of...
The Internet pervades many aspects of our lives and is becoming indispensable to critical functions ...
Identifying anomalies in network traffic logs is a very challenging task for a network analyst. With...
Network security depends heavily on automated Intrusion Detection Systems (IDS) to sense malicious a...
We created a pixel map for multivariate data based on an analysis of the needs of network security e...
Abstract—Network forensics is the critical next step in the analysis of network attacks, intrusions,...
The flood of raw data generated by intrusion detection and other network monitoring devices can be s...
Personal machines are often the weakest points within a large network. Although they run an ever-inc...
Network communication has become indispensable in business, education, and government. With the perv...