14
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data

&
Pages 117-126 | Published online: 11 Dec 2015

References

  • Abdullah, K., Lee, C., Conti, G., Copeland, J. A., and Stasko, J., “IDS Rainstorm: Visualizing IDS Alarms,” in Proceedings of Visualization for Computer Security '05, 2005, pp. 1–10.
  • Anderson, J.E. and Schwager, P.H., “Security in the Information Systems Curriculum: Identification & Status of Relevant Issues,” Journal of Computer Information Systems, 32:3, 2002, pp. 16–24.
  • Erbacher, R.F. and Garber, M., “Real-Time Interactive Visual Port Monitoring and Analysis,” Proceedings of the International Conference on Security and Management, June 2005, pp. 228–234.
  • Erbacher, R.F., Christensen, K., and Sundberg, A., “Designing Visualization Capabilities for IDS Challenges,” Proceedings of the 2005 VizSec Workshop, Minneapolis, MN, October 2005.
  • Fink, G.A., Muessig, P., and North, C., “Visual Correlation of Host Processes and Network Traffic,” in Proceedings of Visualization for Computer Security '05, 2005, pp. 11–20.
  • Fischer, F., Mansmann, F., Keim, D.A., Pietzko, S., and Waldvogel, M., “Large-scale Network Monitoring for Visual Analysis of Attacks,” Proceedings of the 5th International Workshop on Visualization for Computer Security, Lecture Notes in Computer Science, Vol. 5210, 2008, pp. 111–118.
  • Green, J., Marchette, D., Northcutt, S., and Ralph, B., “Analysis Techniques for Detecting Coordinated Attacks and Probes,” Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 9-12, 1999, pp. 1–9.
  • Inselberg, A., “The plane with parallel coordinates,” The Visual Computer, Vol. 1, pp. 69–91, 1985.
  • Irwin, B., and van Riel, J.P., “An Interactive Attack Graph Cascade and Reachability Display,” Proceedings of the 5th International Workshop on Visualization for Computer Security, Springer, 2008, pp. 221–236.
  • Lakkaraju, K., Lee, A.J., and Yurcik, W., “Nvisionip: netflow visualizations of system state for security situational awareness,” In Proceedings of CCS Workshop on Visualization and Data Mining for Computer Security, ACM Conference on Computer and Communications Security, October 29, 2004.
  • Livnat, Y., Agutter, J., Moon, S. Erbacher, R.F., and Foresti, S., “A Visualization Paradigm for Network Intrusion Detection,” Proceedings of the IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 2005, pp. 92–99.
  • Lee, C.P., Copeland, J.A., “Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers,” Proceedings of the 3rd international workshop on Visualization for computer security, Alexandria, Virginia, 2006, pp. 103–108.
  • McPherson, J., Ma, K., Krystosek, P., Bartoletti, T., and Christensen, M., “PortVis: A Tool for Port-Based Detection of Security Events,” Proceedings of CCS Workshop on Visualization and Data Mining for Computer Security, ACM Conference on Computer and Communications Security, October 29, 2004.
  • Oberheide, J., Karir, M., and Blazakis, D., “VAST: visualizing autonomous system topology”, Proceedings of the 3rd international workshop on Visualization for computer security, Alexandria, Virginia, 2006, pp. 71–80.
  • Ptacek, T.H., and Newsham., T.N., “Insertion, Evasion, And Denial Of Service: Eluding Network Intrusion Detection,” Technical Report, Secure Networks, Inc., January 1998.
  • Sedbrook, T. A., “Visualizing Changing Requirements with Self-Organizing Maps,” Journal of Computer Information Systems, Vol. 45; No. 2, 2005, pp. 63–72.
  • Suo, X., Zhu, Y., and Owen, S., “A Task Centered Framework for computer Security Data Visualization,” Proceedings of the 5th International Workshop on Visualization for Computer Security, Lecture Notes in Computer Science, Vol. 5210, 2008, pp. 87–94.
  • Walsh, K. R., and Pawlowski, S. D., “Collaboration and visualization: Integrative opportunities,” Journal of Computer Information Systems, Vol. 44, No. 2, 2004, pp. 58–64.
  • “RFC 793: Transmission Control Protocol,” http://www.faqs.org/rfcs/rfc793.html

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.