메뉴 건너뛰기




Volumn 3783 LNCS, Issue , 2005, Pages 454-466

PCAV: Internet attack visualization on parallel coordinates

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; INTERNET; LARGE SCALE SYSTEMS; NETWORK PROTOCOLS; REAL TIME SYSTEMS; ROUTERS; TELECOMMUNICATION TRAFFIC;

EID: 33646755411     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11602897_38     Document Type: Conference Paper
Times cited : (19)

References (12)
  • 1
    • 0022140354 scopus 로고
    • The plane with parallel coordinates
    • A. Inselberg: The plane with parallel coordinates. The Visual Computer 1(1985) 69-91
    • (1985) The Visual Computer , vol.1 , pp. 69-91
    • Inselberg, A.1
  • 2
    • 33646723809 scopus 로고    scopus 로고
    • Information visualization resources, http://www.infovis.org
  • 3
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • T. Gil, M. Poletto.: MULTOPS: a data-structure for bandwidth attack detection. USENIX Security Symposium (2001)
    • (2001) USENIX Security Symposium
    • Gil, T.1    Poletto, M.2
  • 4
    • 0042262063 scopus 로고    scopus 로고
    • Visual exploration of large databases
    • D. Keim.: Visual exploration of large databases. Communications of the ACM (2001) 38-44
    • (2001) Communications of the ACM , pp. 38-44
    • Keim, D.1
  • 5
    • 33646723018 scopus 로고    scopus 로고
    • Cisco NetFlow, http://www.cisco.com/warp/public/732/Tech/netflow
  • 6
    • 33845526343 scopus 로고    scopus 로고
    • Visualization for intrusion detection: Hooking the worm
    • S. Axelsson.: Visualization for intrusion detection: Hooking the worm. ESORICS (2003)
    • (2003) ESORICS
    • Axelsson, S.1
  • 7
    • 33646720639 scopus 로고    scopus 로고
    • nProbe, http://www.ntop.org/nProbe.html
  • 8
    • 0141552473 scopus 로고    scopus 로고
    • Flowscan: A network traffic flow reporting and visualization tool
    • D. Plonka.: Flowscan: A Network Traffic Flow Reporting and Visualization Tool. USENIX LISA (2000)
    • (2000) USENIX LISA
    • Plonka, D.1
  • 9
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • C.Estan, S.Savage and G.Varghese.: Automatically Inferring Patterns of Resource Consumption in Network Traffic. ACM SIGCOMM (2003)
    • (2003) ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 10
    • 6444229776 scopus 로고    scopus 로고
    • Real-time visualization of network attacks on high-speed link
    • H. Kim, I. Kang, and S. Bank.: Real-time Visualization of Network Attacks on High-speed Link. IEEE Network Magazine (2004)
    • (2004) IEEE Network Magazine
    • Kim, H.1    Kang, I.2    Bank, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.