메뉴 건너뛰기




Volumn , Issue , 2009, Pages 186-198

FloVis: Flow visualization system

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVITY DIAGRAM; COMMAND LINE; DISPLAY MODES; DRILL-DOWN; ENTERPRISE NETWORKS; FLOW VISUALIZATION SYSTEMS; FORENSIC ANALYSIS; HOST BEHAVIORS; NETFLOW; NETFLOW DATA; RELATIONAL DATABASE; SYSTEM SUPPORTS; VISUALIZATION TOOLS;

EID: 66249140932     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CATCH.2009.18     Document Type: Conference Paper
Times cited : (50)

References (25)
  • 3
    • 33749537716 scopus 로고    scopus 로고
    • Visual correlation of host processes and network traffic
    • DOI 10.1109/VIZSEC.2005.1532061, 1532061, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
    • F. Fischer, F. Mansmann, D. A. Keim, S. Pietzko, and M. Waldvogel. Large-scale network monitoring for visual analysis of attacks. In J. R. Goodall, G. J. Conti, and K.- L. Ma, editors, VizSEC, volume 5210 of Lecture Notes in Computer Science, pages 111-118. Springer, 2008. (Pubitemid 44523243)
    • (2005) IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings , pp. 11-19
    • Fink, G.A.1    Muessig, P.2    North, C.3
  • 5
    • 85035495585 scopus 로고
    • Generalized fisheye views
    • Generalized fisheye views. SIGCHI Bulletin,17(4):16-23, 1986.
    • (1986) SIGCHI Bulletin , vol.17 , Issue.4 , pp. 16-23
    • Furnas, G.W.1
  • 6
    • 49949110337 scopus 로고    scopus 로고
    • The contact surface: A technique for exploring internet scale emergent behaviors
    • D. Zamboni, editor, of Lecture Notes in Computer Science, Paris, France, July , Springer
    • C. Gates and J. McHugh. The contact surface: A technique for exploring internet scale emergent behaviors. In D. Zamboni, editor, Proceedings of the Fifth Conference on the Detection of Intrusions and Malware & Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, pages 228-246, Paris, France, July 2008. Springer.
    • (2008) Proceedings of the Fifth Conference on the Detectionf Intrusions and Malware and Vulnerability Assessment , vol.5137 , pp. 228-246
    • Gates, C.1    McHugh, J.2
  • 8
    • 66249118882 scopus 로고    scopus 로고
    • Visualizations of flow and analytical results
    • Jan 2008., A pdf of the slides is available from the FloCon 2008 web site,21 October 2008
    • P. Groce and J. Janies. Visualizations of flow and analytical results. Powerpoint presentation at FloCon, Jan 2008. A pdf of the slides is available from the FloCon 2008 web site, http://www.cert.org/flocon/2008/ proceedings.html, as of 21 October
    • (2008) Powerpoint Presentation at Flocon
    • Groce, P.1    Janies, J.2
  • 9
    • 66249083325 scopus 로고    scopus 로고
    • CRPIT, In K. Misue, K. Sugiyama, and J. Tanaka, editors, APVIS Australian Computer Society, 197
    • Y. Hideshima and H. Koike. STARMINE: A visualization system for cyber attacks. In K. Misue, K. Sugiyama, and J. Tanaka, editors, APVIS, volume 60 of CRPIT, pages 131-138. Australian Computer Society, 2006. 197
    • (2006) STARMINE: A visualization system for cyber attacks , vol.60 , pp. 131-138
    • Hideshima, Y.1    Koike, H.2
  • 10
    • 33845640864 scopus 로고    scopus 로고
    • Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data
    • D. Holten. Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data. IEEE Transactions on Visualization and Computer Graphics, 12(5):741-748,2006.
    • (2006) IEEE Transactions on Visualization and Computer Graphics , vol.12 , Issue.5 , pp. 741-748
    • Holten, D.1
  • 13
    • 4243116400 scopus 로고    scopus 로고
    • The spinning cube of potential doom
    • S. Lau. The spinning cube of potential doom. Communications of the ACM, 47(6):25-26, 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 25-26
    • Lau, S.1
  • 14
  • 15
    • 35948957403 scopus 로고    scopus 로고
    • Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
    • DOI 10.1109/TVCG.2007.70522
    • Mansmann, D. A. Keim, S. C. North, B. Rexroad, and D. Sheleheda. Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of securitythreats. IEEE Transactions on Visualization and Computer Graphics, 13 Paradigms, pages 3-10, Ascona, Switzerland, August 2003. (Pubitemid 350076578)
    • (2007) IEEE Transactions on Visualization and Computer Graphics , vol.13 , Issue.6 , pp. 1105-1112
    • Mansmann, F.1    Keim, D.A.2    North, S.C.3    Rexroad, B.4    Sheleheda, D.5
  • 17
    • 17644414542 scopus 로고    scopus 로고
    • Locality: A new paradigm for thinking about normal behavior and outsider threat
    • Ascona, Switzerland, August
    • J. McHugh and C. Gates. Locality: A new paradigm for thinking about normal behavior and outsider threat. In NSPW '03: Proceedings of the 2003 Workshop on New Security Paradigms, pages 3-10, Ascona, Switzerland, August 2003.
    • (2003) NSPW '03: Proceedings of the 2003 Workshop on New Security Paradigms , pp. 3-10
    • McHugh, J.1    Gates, C.2
  • 18
    • 49949096506 scopus 로고    scopus 로고
    • Situational awareness and network traffic analysis
    • volume 196 of NATO Science Series II. Mathematics, Physics, and Chemistry, Gdansk, Poland, September
    • J. McHugh, C. Gates, and D. Becknel. Situational awareness and network traffic analysis. In Proceedings of the Gdansk NATO Workshop on Cyberspace Security and Defence: Research Issues, volume 196 of NATO Science Series II. Mathematics, Physics, and Chemistry, pages 209 - 228, Gdansk, Poland, September 2004.
    • (2004) Proceedings of the Gdansk NATO Workshop on Cyberspace Security and Defence: Research Issues , pp. 209-228
    • McHugh, J.1    Gates, C.2    Becknel, D.3
  • 21
    • 84890932071 scopus 로고    scopus 로고
    • Visual analysis of network flow data with timelines and event plots
    • In J. R. Goodall, G. Conti, and K. L. Ma, editors, Springer,10.1007/978- 3-540-78243-8 6
    • D. Phan, J. Gerth, M. Lee, A. Paepcke, and T.Winograd. Visual analysis of network flow data with timelines and event plots. In J. R. Goodall, G. Conti, and K. L. Ma, editors, VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security, pages85-99. Springer, 2008. 10.1007/978-3-540-78243-8 6.
    • (2008) VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security , pp. 85-99
    • Phan, D.1    Gerth, J.2    Lee, M.3    Paepcke, A.4    Winograd, T.5
  • 22
    • 0008734185 scopus 로고    scopus 로고
    • To see or not to see: The Need for Attention to Perceive Changes in Scenes
    • R. A. Rensink, J. K. O'Regan, and J. J. Clark. To see or not to see: The need for attention to perceive changes in scenes. Psychological Science, 8:368-373, 1997. (Pubitemid 127455296)
    • (1997) Psychological Science , vol.8 , Issue.5 , pp. 368-373
    • Rensink, R.A.1    O'Regan, J.K.2    Clark, J.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.