메뉴 건너뛰기




Volumn , Issue , 2007, Pages 726-733

Visualising communication network security attacks

Author keywords

Alarm visualization; Alert visualization; IDS alarms; Network security information visualization

Indexed keywords

DATA ACQUISITION; NETWORK SECURITY; REAL TIME SYSTEMS; TELECOMMUNICATION NETWORKS; THREE DIMENSIONAL;

EID: 35348837981     PISSN: 10939547     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IV.2007.149     Document Type: Conference Paper
Times cited : (15)

References (21)
  • 8
    • 4243116400 scopus 로고    scopus 로고
    • The Spinning Cube of Potential Doom
    • S. Lau, "The Spinning Cube of Potential Doom," Commun ACM, vol. 47, pp. 25-26, 2004.
    • (2004) Commun ACM , vol.47 , pp. 25-26
    • Lau, S.1
  • 10
    • 33749520207 scopus 로고    scopus 로고
    • K. Abdullah, C. P. Lee, G. Conti, J. A. Copeland and J. Stasko, IDS Rainstorm: Visualizing IDS alarms, in Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on 2005, pp. 1-10.
    • K. Abdullah, C. P. Lee, G. Conti, J. A. Copeland and J. Stasko, "IDS Rainstorm: Visualizing IDS alarms," in Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on 2005, pp. 1-10.
  • 11
    • 35348891443 scopus 로고    scopus 로고
    • 13 April, logs. Available
    • J. Chartier. (2005, 13 April). SnortALog : Snort analyser logs. Available: http://jeremy.chartier.free.fr/snortalog/index.html# sample
    • (2005) SnortALog : Snort analyser
    • Chartier, J.1
  • 16
    • 33749517393 scopus 로고    scopus 로고
    • Information assurance visualizations for specific stages of situational awareness and intended uses: Lessons learned
    • A. Dapos Amico and M. Kocka, "Information assurance visualizations for specific stages of situational awareness and intended uses: Lessons learned," in Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on, 2005, pp. 107-112.
    • (2005) Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on , pp. 107-112
    • Dapos Amico, A.1    Kocka, M.2
  • 17
    • 30644478743 scopus 로고    scopus 로고
    • G. Tedesco and U. Aickelin. (2006), Data reduction in intrusion alert correlation. WSEAS Transactions on Computers pp. 186-193. Available: http://eprints.nottingham.ac.uk/archive/00000365/
    • G. Tedesco and U. Aickelin. (2006), Data reduction in intrusion alert correlation. WSEAS Transactions on Computers pp. 186-193. Available: http://eprints.nottingham.ac.uk/archive/00000365/
  • 18
    • 35348878547 scopus 로고    scopus 로고
    • MaxMind LLC, MaxMind, GeoIP, 2006, 26 May 2006. 2006.
    • MaxMind LLC, "MaxMind, GeoIP," vol. 2006, 26 May 2006. 2006.
  • 20
    • 35348858101 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory. DARPA intrusion detection evaluation, pp. Last Date Accessed: 05/09/2005. Available: http://www.ll.mit.edu/IST/ideval/data/ data_index.html
    • MIT Lincoln Laboratory. DARPA intrusion detection evaluation, pp. Last Date Accessed: 05/09/2005. Available: http://www.ll.mit.edu/IST/ideval/data/ data_index.html
  • 21
    • 35348880918 scopus 로고    scopus 로고
    • IANA. (2006, 12-Mar-2006). Internet assigned numbers authority. [Online]. 2006(26-Jun-2006), pp. 1. Available: http://www.iana.org/assignments/protocol- numbers
    • IANA. (2006, 12-Mar-2006). Internet assigned numbers authority. [Online]. 2006(26-Jun-2006), pp. 1. Available: http://www.iana.org/assignments/protocol- numbers


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.