Visual information seeking: tight coupling of dynamic query filters with starfield displays
CHI '94 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An analysis of BGP convergence properties
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Stable Internet routing without global coordination
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Towards an effective cooperation of the user and the computer for classification
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Visualizing multi-dimensional clusters, trends, and outliers using star coordinates
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Case study: interactive visualization for internet security
Proceedings of the conference on Visualization '02
An Eye on Network Intruder-Administrator Shootouts
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Considering Both Intra-Pattern and Inter-Pattern Anomalies for Intrusion Detection
ICDM '02 Proceedings of the 2002 IEEE International Conference on Data Mining
Data Mining Methods for Detection of New Malicious Executables
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Learning Rules for Anomaly Detection of Hostile Network Traffic
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
PaintingClass: interactive construction, visualization and exploration of decision trees
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
A Visual Exploration Process for the Analysis of Internet Routing Data
Proceedings of the 14th IEEE Visualization 2003 (VIS'03)
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
MoireGraphs: radial focus+context visualization and interaction for graphs with visual nodes
INFOVIS'03 Proceedings of the Ninth annual IEEE conference on Information visualization
Intrusion and misuse detection in large-scale systems
IEEE Computer Graphics and Applications
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
InetVis, a visual tool for network telescope traffic analysis
AFRIGRAPH '06 Proceedings of the 4th international conference on Computer graphics, virtual reality, visualisation and interaction in Africa
Hierarchical Visualization of Network Intrusion Detection Data
IEEE Computer Graphics and Applications
Focusing on Context in Network Traffic Analysis
IEEE Computer Graphics and Applications
Cyber security through visualization
APVis '06 Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60
Interactive Exploration of Data Traffic with Hierarchical Network Maps
IEEE Transactions on Visualization and Computer Graphics
CluVis: dual-domain visual exploration of cluster/network metadata
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
A Model and Framework for Visualization Exploration
IEEE Transactions on Visualization and Computer Graphics
IEEE Transactions on Visualization and Computer Graphics
Visual Analytics: Scope and Challenges
Visual Data Mining
BGPeep: An IP-Space Centered View for Internet Routing Data
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Using Visualization Process Graphs to Improve Visualization Exploration
Provenance and Annotation of Data and Processes
Using an Evolutionary Neural Network for web intrusion detection
AIA '08 Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications
Managing networks through context: Graph visualization and exploration
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey of security visualization for computer network logs
Security and Communication Networks
Proceedings of the Tenth Workshop on Visualization for Cyber Security
Visual analysis of large-scale network anomalies
IBM Journal of Research and Development
Hi-index | 0.00 |
To ensure the normal operation of a large computer network system, the common practice is to constantly collect system logs and analyze the network activities for detecting anomalies. Most of the analysis methods in use today are highly automated due to the enormous size of the collected data. Conventional automated methods are largely based on statistical modeling, and some employ machine learning. This article presents interactive visualization as an alternative and effective data exploration method for understanding the complex behaviors of computer network systems. It describes three log-file analysis applications, and demonstrates how the use of the authors' visualization-centered tools can lead to the discovery of flaws and intruders in the network systems.