메뉴 건너뛰기




Volumn P-149, Issue , 2009, Pages 115-124

Interactive analysis of netflows for misuse detection in large IP networks

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS; INTERNET TELEPHONY; INTERNET PROTOCOLS; INTRUSION DETECTION; NETWORK SECURITY;

EID: 84874674099     PISSN: 16175468     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (19)
  • 3
    • 35948950484 scopus 로고    scopus 로고
    • CAIDA: Visualizing the internet
    • Cla01
    • [Cla01] K.C. Claffy. CAIDA: Visualizing the Internet. IEEE Internet Computing, 05(1), 2001.
    • (2001) IEEE Internet Computing , vol.5 , Issue.1
    • Claffy, K.C.1
  • 8
    • 33845640864 scopus 로고    scopus 로고
    • Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data
    • Hol06
    • [Hol06] Danny Holten. Hierarchical Edge Bundles: Visualization of Adjacency Relations in Hierarchical Data. IEEE Trans. Vis. Comput. Graph., 12(5):741-748, 2006.
    • (2006) IEEE Trans. Vis. Comput. Graph , vol.12 , Issue.5 , pp. 741-748
    • Holten, D.1
  • 9
    • 0003545916 scopus 로고
    • Finding groups in data. An introduction to cluster analysis
    • KR90],Wiley Series in Probability and Mathematical Statistics., New York: Wiley
    • [KR90] L. Kaufman and P.J. Rousseeuw. Finding groups in data. An introduction to cluster analysis. Wiley Series in Probability and Mathematical Statistics. Applied Probability and Statistics, New York: Wiley, 1990.
    • (1990) Applied Probability and Statistics
    • Kaufman, L.1    Rousseeuw, P.J.2
  • 14
    • 35948957403 scopus 로고    scopus 로고
    • Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
    • MKN+07
    • [MKN+07] Florian Mansmann, Daniel A. Keim, Stephen C. North, Brian Rexroad, and Daniel Sheleheda. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. IEEE Transactions on Visualization and Computer Graphics, 13(6):1105-1112, 2007.
    • (2007) IEEE Transactions on Visualization and Computer Graphics , vol.13 , Issue.6 , pp. 1105-1112
    • Mansmann, F.1    Keim, D.A.2    North, S.C.3    Rexroad, B.4    Sheleheda, D.5
  • 15
    • 84898792789 scopus 로고    scopus 로고
    • A graphical web based front end for the nfdump netflow tools
    • NfS07
    • [NfS07] NfSen - Netflow Sensor. A graphical web based front end for the nfdump netflow tools, 2007. http://nfsen.sourceforge.net/.
    • (2007) NfSen - Netflow Sensor
  • 16
    • 42749103746 scopus 로고    scopus 로고
    • Stager a web based application for presenting network statistics
    • Osl06
    • [Osl06] A. Oslebo. Stager AWeb Based Application for Presenting Network Statistics. In Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP, pages 1-15, 2006.
    • (2006) thIEEE/IFIP , pp. 1-15
    • Oslebo, A.1
  • 17
    • 84941149577 scopus 로고    scopus 로고
    • The OSU flow-tools package and CISCO net flow logs
    • RFL00] Berkeley, CA, USA, USENIX Association
    • [RFL00] Steve Romig, Mark Fullmer, and Ron Luman. The OSU Flow-tools Package and CISCO Net Flow Logs. In LISA '00: Proceedings of the 14th USENIX conference on System administration, pages 291-304, Berkeley, CA, USA, 2000. USENIX Association. http://www.splintered.net/sw/flow-tools/.
    • (2000) th USENIX Conference on System Administration , pp. 291-304
    • Romig, S.1    Fullmer, M.2    Luman, R.3
  • 18
    • 84976715951 scopus 로고
    • Tree visualization with tree-maps: 2-d space-filling approach
    • Shn92
    • [Shn92] Ben Shneiderman. Tree visualization with tree-maps: 2-d space-filling approach. ACM Trans. Graph., 11(1):92-99, 1992.
    • (1992) ACM Trans. Graph , vol.11 , Issue.1 , pp. 92-99
    • Shneiderman, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.