110
Voted
VIZSEC
15 years 6 months ago
2005 Springer
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
110
click to vote
VIZSEC
15 years 6 months ago
2005 Springer
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
102
Voted
VIZSEC
15 years 6 months ago
2005 Springer
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
118
click to vote
VIZSEC
15 years 6 months ago
2005 Springer
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
VIZSEC
15 years 6 months ago
2005 Springer
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
|