메뉴 건너뛰기




Volumn , Issue , 2004, Pages 65-72

NVisionIP: NetFlow visualizations of system state for security situational awareness

Author keywords

NetFlows; Security system state; Security visualization; Situational awareness

Indexed keywords

NETFLOWS; SECURITY SYSTEM STATE; SECURITY VISUALIZATION; SITUATIONAL AWARENESS;

EID: 20444484611     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (225)

References (31)
  • 1
    • 15744365585 scopus 로고    scopus 로고
    • Mar.
    • Argus - metrics. Web Page, Mar. 2001. 〈http://www.qosient.com/argus/metrics.htm〉.
    • (2001) Argus - Metrics. Web Page
  • 2
    • 3142657520 scopus 로고    scopus 로고
    • A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks
    • Ratna Bearavolu, Kiran Lakkaraju, William Yurcik, and Hrishikesh Raje. A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks. In IEEE Military Communications Conference (Milcom), 2003.
    • (2003) IEEE Military Communications Conference (Milcom)
    • Bearavolu, R.1    Lakkaraju, K.2    Yurcik, W.3    Raje, H.4
  • 3
    • 24944574614 scopus 로고    scopus 로고
    • Jan. (Jun. 2004).
    • CERT/CC Statistics 1988-2003, Jan. 2004. 〈http://www.cert.org/stats/〉. (Jun. 2004).
    • (2004) CERT/CC Statistics 1988-2003
  • 5
    • 3142735378 scopus 로고    scopus 로고
    • Security applications for cisco netflow data
    • SANS, Jul.
    • Jana Dunn. Security applications for cisco netflow data. Technical report, SANS, Jul. 2001. 〈http://www.sans.org/rr/papers/index.php?id=778〉.
    • (2001) Technical Report
    • Dunn, J.1
  • 7
    • 0242414940 scopus 로고    scopus 로고
    • Intrusion and misuse detection in large-scale systems
    • Jan.-Feb.
    • Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke. Intrusion and misuse detection in large-scale systems. Computer Graphics and Applications, 22(1):38-48, Jan.-Feb. 2002.
    • (2002) Computer Graphics and Applications , vol.22 , Issue.1 , pp. 38-48
    • Erbacher, R.F.1    Walker, K.L.2    Frincke, D.A.3
  • 9
    • 20444435141 scopus 로고    scopus 로고
    • National Center for Supercomputing Applications, Apr.
    • NCSA Automated Learning Group. D2K Toolkit User Manual. National Center for Supercomputing Applications, Apr. 2003. 〈http://algdocs.ncsa.uiuc.edu/TU-20030425-1.pdf〉.
    • (2003) D2K Toolkit User Manual
  • 14
    • 4243116400 scopus 로고    scopus 로고
    • The spinning cube of potential doom
    • Jun.
    • Stephen Lau. The spinning cube of potential doom. Communications of the ACM, 47(6):25-26, Jun. 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 25-26
    • Lau, S.1
  • 15
    • 85094839698 scopus 로고    scopus 로고
    • Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics
    • Dec.
    • John-Paul Navarro, Bill Nickless, and Linda Winkler. Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics. In 14th Systems Administration Conference (LISA 2000), Dec. 2000.
    • (2000) 14th Systems Administration Conference (LISA 2000)
    • Navarro, J.-P.1    Nickless, B.2    Winkler, L.3
  • 21
    • 84976715951 scopus 로고
    • Tree visualization with tree-maps: 2-d space-filling approach
    • Ben Shneiderman. Tree visualization with tree-maps: 2-d space-filling approach. ACM Trans. Graph., 11(1):92-99, 1992.
    • (1992) ACM Trans. Graph. , vol.11 , Issue.1 , pp. 92-99
    • Shneiderman, B.1
  • 22
  • 25
    • 84860940569 scopus 로고    scopus 로고
    • Jun.
    • Security threat manager. Web Page, Jun. 2004. 〈http://www.open.com/products/threatmanager/threatmanager. shtml%〉.
    • (2004) Security Threat Manager. Web Page
  • 26
    • 0036448607 scopus 로고    scopus 로고
    • Case study: Interactive visualization for internet security
    • Soon Tee Teoh, Kwan-Liu Ma, S. Felix Wu, and Xiaoliang Zhao. Case study: Interactive visualization for internet security. In IEEE Visualization, 2002.
    • (2002) IEEE Visualization
    • Teoh, S.T.1    Ma, K.-L.2    Felix Wu, S.3    Zhao, X.4
  • 27
  • 28
    • 84860952433 scopus 로고    scopus 로고
    • May
    • United States Department of Homeland Security. Team Coordination Training, Student Guide, May 2004. 〈http://www.cgaux.info/g_ocx/training/tct/〉.
    • (2004) Team Coordination Training, Student Guide


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.