منابع مشابه
Investigating Network Traffic Through Compressed Graph Visualization
Compressed Graph Visualization is a visual analytics method to scale the traditional node-link representation to huge graphs. This paper introduces its visualization, data processing and visual analytics process in solving Mini-Challenge 2 of VAST 2012 contest.
متن کاملQueueing analysis of network traffic: methodology and visualization tools
In this paper we provide a framework for analyzing network traffic traces through trace-driven queueing. We also introduce several queueing metrics together with the associated visualization tools (some novel) that provide insight into the traffic features and facilitate comparisons between traces. Some techniques for non-stationary data are discussed. Applying our framework to both real and sy...
متن کاملVisualization of Network Security Traffic using Hexagonal Self-Organizing Maps
A hexagonal Self-Organising Map (SOM) based on the Vulture Fest Model of intrusion detection illustrates the network landscape of wireless traffic comparing it with malicious traffic and contrasting it to traditional landline network traffic. This map can also provide visual security profiles of work groups and LAN administrators.
متن کاملNeural visualization of network traffic data for intrusion detection
This study introduces and describes a novel Intrusion Detection System (IDS) called MOVCIDS (MObile Visualization Connectionist IDS). This system applies neural projection architectures to detect anomalous situations taking place in a computer network. By its advanced visualization facilities, the proposed IDS allows providing an overview of the network traffic as well as identifying anomalous ...
متن کاملNetwork Traffic Visualization Framework for Threat Prediction and Detection
---------------------------------------------------------------------***-------------------------------------------------------------------AbstractComputer network plays a very important role in information and which also suffers from all kinds of illegal access and attacks. So network forensic analysts may need to check the entire network traffic data, which takes long time to complete the eva...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Smart Sensor and Adhoc Network.
سال: 2013
ISSN: 2248-9738
DOI: 10.47893/ijssan.2013.1170