DATA VISUALIZATION OF NETWORK SECURITY SYSTEMS

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Large Scale Network Security Visualization

Intrusion Detection Systems and other network security tools often provide only text-based output. Multiple systems are employed by network security analysts, which means that the analyst is required to focus on and pay attention to multiple screens, lists and textual output that these systems provide. Even correlation and fusion engines that combine the output of many intrusion detection senso...

متن کامل

Improving Network Monitoring and Security via Visualization

Internet networks are handling increasing volume of traffic than ever before. This data is mainly associated to sensitive, distributed, and multimedia applications. In the past years, much attention has been paid to the way network infrastructure must be designed and developed in order to handle the challenges of delivering high quality services for applications such as VoIP and streaming video...

متن کامل

Flovis: a Network Security Visualization Framework

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Chapter

متن کامل

Cyber Security Network Anomaly Detection and Visualization

In this Major Qualifying Project, we present a novel anomaly detection system for computer networks and a visualization system to help users explore network captures. The detection algorithm uses Robust Principal Component Analysis to produce a lower dimensional subspace of the original data for which a sparse matrix of outliers occurs. This low dimensional data subspace is determined by a nove...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Acta Electrotechnica et Informatica

سال: 2014

ISSN: 1335-8243,1338-3957

DOI: 10.15546/aeei-2014-0034