메뉴 건너뛰기




Volumn 28, Issue 5, 2009, Pages 276-288

Fast detection and visualization of network attacks on parallel coordinates

Author keywords

DDoS attacks; Internet attack visualization; Internet worms; Parallel coordinate attack visualization (PCAV); Parallel coordinates

Indexed keywords

DDOS ATTACKS; INTERNET ATTACK VISUALIZATION; INTERNET WORMS; PARALLEL COORDINATE ATTACK VISUALIZATION (PCAV); PARALLEL COORDINATES;

EID: 67349158355     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.12.003     Document Type: Article
Times cited : (74)

References (22)
  • 2
    • 33845526343 scopus 로고    scopus 로고
    • Visualization for intrusion detection: Hooking the worm
    • October
    • Axelsson S. Visualization for intrusion detection: Hooking the worm. In: Proc. of ESORICS; October 2003.
    • (2003) Proc. of ESORICS
    • Axelsson, S.1
  • 3
    • 56449096542 scopus 로고    scopus 로고
    • Cisco Systems, Inc.
    • Cisco IOS NetFlow (2006), Cisco Systems, Inc. http://www.cisco.com/warp/public/732/Tech/netflow
    • (2006) Cisco IOS NetFlow
  • 4
    • 20444438039 scopus 로고    scopus 로고
    • Passive visual fingerprinting of network attack tools
    • October
    • Conti G, Abdullah K. Passive visual fingerprinting of network attack tools. In: Proc. of ACM VizSEC/DMSEC; October 2004.
    • (2004) Proc. of ACM VizSEC/DMSEC
    • Conti, G.1    Abdullah, K.2
  • 6
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • August
    • Gil T, Poletto M. MULTOPS: a data-structure for bandwidth attack detection. In: Proc. of USENIX security symposium; August 2001.
    • (2001) Proc. of USENIX security symposium
    • Gil, T.1    Poletto, M.2
  • 7
    • 28444464348 scopus 로고
    • The plane with parallel coordinates
    • Inselberg A. The plane with parallel coordinates. The Visual Computer (1985) 69-91
    • (1985) The Visual Computer , pp. 69-91
    • Inselberg, A.1
  • 9
    • 0042262063 scopus 로고    scopus 로고
    • Visual exploration of large data sets
    • Keim D.A. Visual exploration of large data sets. Communications of the ACM (2001) 38-44
    • (2001) Communications of the ACM , pp. 38-44
    • Keim, D.A.1
  • 10
    • 24344452007 scopus 로고    scopus 로고
    • A study of analyzing network traffic as images in real-time
    • Kim S, Reddy A. A study of analyzing network traffic as images in real-time. In: Proc. of IEEE INFOCOM; 2005.
    • (2005) Proc. of IEEE INFOCOM
    • Kim, S.1    Reddy, A.2
  • 11
    • 6444229776 scopus 로고    scopus 로고
    • Real-time visualization of network attacks on high-speed links
    • Kim H., Kang I., and Bahk S. Real-time visualization of network attacks on high-speed links. IEEE Network (2004)
    • (2004) IEEE Network
    • Kim, H.1    Kang, I.2    Bahk, S.3
  • 13
    • 20444484611 scopus 로고    scopus 로고
    • NVisionIP: Netflow visualizations of system state for security situational awareness
    • Lakkaraju K, Yurcik W, Adam J. NVisionIP: netflow visualizations of system state for security situational awareness. In: Proc. of ACM VizSEC/DMSEC; 2004. p. 65-72.
    • (2004) Proc. of ACM VizSEC/DMSEC , pp. 65-72
    • Lakkaraju, K.1    Yurcik, W.2    Adam, J.3
  • 17
    • 34248377875 scopus 로고    scopus 로고
    • SVision: A novel visual network-anomaly identification technique
    • Onut I.-V., and Ghorbani A.A. SVision: A novel visual network-anomaly identification technique. Computers and Security (2007) 201-212
    • (2007) Computers and Security , pp. 201-212
    • Onut, I.-V.1    Ghorbani, A.A.2
  • 19
    • 51049097722 scopus 로고    scopus 로고
    • On the efficiency of using space-filling curves in network traffic representation
    • Samak T, Ghanem S, Ismail MA. On the efficiency of using space-filling curves in network traffic representation. In: Proc. of IEEE INFOCOM; 2008.
    • (2008) Proc. of IEEE INFOCOM
    • Samak, T.1    Ghanem, S.2    Ismail, M.A.3
  • 22
    • 67349141824 scopus 로고    scopus 로고
    • VisFlowConnect: NetFlow visualizations of link relationships for security situational awarenes
    • Yin X, Yurcik W, Treaster M, Li Y, Lakkaraju K. VisFlowConnect: NetFlow visualizations of link relationships for security situational awarenes. In: Proc. of ACM VizSEC/DMSEC; 2004.
    • (2004) Proc. of ACM VizSEC/DMSEC
    • Yin, X.1    Yurcik, W.2    Treaster, M.3    Li, Y.4    Lakkaraju, K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.