An Information Visualization Framework for Intrusion Detection
CHI '04 Extended Abstracts on Human Factors in Computing Systems
SP 800-30. Risk Management Guide for Information Technology Systems
SP 800-30. Risk Management Guide for Information Technology Systems
A unified approach to network traffic and network security visualisation
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hi-index | 0.00 |
As most major organisations increase their reliance on the Internet, they find the facilities and services made available to them in the area of eCommerce also bring a number of associated risks. The organisations may be exposed to tangible loss of revenue and also to intangible loss of reputation. Companies are now looking for ways to minimise these risks by implementing risk management solutions.The main risk associated with on-line commerce is having intrusions into sensitive company information such as company secrets, billing information or employee details by unauthorised users (disgruntled employees, hackers, industrial espionage).After the identification of such risks we look at deploying countermeasures (CMs) to help minimise their consequences. Many more organisations are now deploying CMs in the form of intrusion detection systems to help protect their networks by identifying unlawful entry -- however, this comes at a price. It is now very easy to collect too much data. In this paper we present research into making this identification process easier by making use of interoperable visualisation tools.