VISUALIZATION OF NETWORK TRAFFIC

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating Network Traffic Through Compressed Graph Visualization

Compressed Graph Visualization is a visual analytics method to scale the traditional node-link representation to huge graphs. This paper introduces its visualization, data processing and visual analytics process in solving Mini-Challenge 2 of VAST 2012 contest.

متن کامل

Queueing analysis of network traffic: methodology and visualization tools

In this paper we provide a framework for analyzing network traffic traces through trace-driven queueing. We also introduce several queueing metrics together with the associated visualization tools (some novel) that provide insight into the traffic features and facilitate comparisons between traces. Some techniques for non-stationary data are discussed. Applying our framework to both real and sy...

متن کامل

Visualization of Network Security Traffic using Hexagonal Self-Organizing Maps

A hexagonal Self-Organising Map (SOM) based on the Vulture Fest Model of intrusion detection illustrates the network landscape of wireless traffic comparing it with malicious traffic and contrasting it to traditional landline network traffic. This map can also provide visual security profiles of work groups and LAN administrators.

متن کامل

Neural visualization of network traffic data for intrusion detection

This study introduces and describes a novel Intrusion Detection System (IDS) called MOVCIDS (MObile Visualization Connectionist IDS). This system applies neural projection architectures to detect anomalous situations taking place in a computer network. By its advanced visualization facilities, the proposed IDS allows providing an overview of the network traffic as well as identifying anomalous ...

متن کامل

Network Traffic Visualization Framework for Threat Prediction and Detection

---------------------------------------------------------------------***-------------------------------------------------------------------AbstractComputer network plays a very important role in information and which also suffers from all kinds of illegal access and attacks. So network forensic analysts may need to check the entire network traffic data, which takes long time to complete the eva...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Smart Sensor and Adhoc Network.

سال: 2013

ISSN: 2248-9738

DOI: 10.47893/ijssan.2013.1170