-
1
-
-
84903306252
-
Correlation between netflow system and network views for intrusion detection
-
C. Abad, Y. Li, K. Lakkaraju, X. Yin, W. Yurcik. Correlation Between NetFlow System and Network Views for Intrusion Detection. Workshop on Link Analysis, Counter-terrorism, and Privacy held in conjunction with SDM 2004, 2004.
-
(2004)
Workshop on Link Analysis, Counter-Terrorism, and Privacy Held in Conjunction with SDM 2004
-
-
Abad, C.1
Li, Y.2
Lakkaraju, K.3
Yin, X.4
Yurcik, W.5
-
2
-
-
84944721192
-
Log correlation for intrusion detection: A proof of concept
-
C. Abad, J. Taylor, C. Sengul, W. Yurcik, Y. Zhou, K. Rowe. Log Correlation for Intrusion Detection: A Proof of Concept. Annual Computer Security Applications Conf. (AC-SAC), 2003.
-
(2003)
Annual Computer Security Applications Conf. (AC-SAC)
-
-
Abad, C.1
Taylor, J.2
Sengul, C.3
Yurcik, W.4
Zhou, Y.5
Rowe, K.6
-
5
-
-
3142657520
-
A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks
-
R. Bearavolu, K. Lakkaraju, W. Yurcik, H. Raje. A Visualization Tool for Situational Awareness of Tactical and Strategic Security Events on Large and Complex Computer Networks. IEEE Milcom, 2003.
-
(2003)
IEEE Milcom
-
-
Bearavolu, R.1
Lakkaraju, K.2
Yurcik, W.3
Raje, H.4
-
9
-
-
0002766331
-
3D geographic network displays
-
K. Cox, S. Eick, T. He. 3D Geographic Network Displays. ACM SIGMOD Record, 25(4):50-54, 1996.
-
(1996)
ACM SIGMOD Record
, vol.25
, Issue.4
, pp. 50-54
-
-
Cox, K.1
Eick, S.2
He, T.3
-
12
-
-
0242529344
-
Aggregation and correlation of intrusion detection alerts
-
H. Debar, A. Wespi. Aggregation and Correlation of Intrusion Detection Alerts. RAID, 2001.
-
(2001)
RAID
-
-
Debar, H.1
Wespi, A.2
-
14
-
-
84997930789
-
Navigating large networks with hierarchies
-
S. Eick, G. Wills. Navigating Large Networks with Hierarchies. IEEE Visualization, 1993.
-
(1993)
IEEE Visualization
-
-
Eick, S.1
Wills, G.2
-
15
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
R. Erbacher, K. Walker, D. Frincke. Intrusion and Misuse Detection in Large-Scale Systems. IEEE Comp. Graphics and Applications, 22(1):38-48, 2002.
-
(2002)
IEEE Comp. Graphics and Applications
, vol.22
, Issue.1
, pp. 38-48
-
-
Erbacher, R.1
Walker, K.2
Frincke, D.3
-
16
-
-
85117717445
-
The network vulnerability tool (NVT) - A system vulnerability visualization architecture
-
R. Henning, K. Fox. The Network Vulnerability Tool (NVT) - A System Vulnerability Visualization Architecture. NISSC, 2000.
-
(2000)
NISSC
-
-
Henning, R.1
Fox, K.2
-
19
-
-
20444484611
-
Nvisionip: Netflow visualizations of system state for security situational awareness
-
K. Lakkaraju, W. Yurcik, A. J. Lee, R. Bearavolu, Y. Li, X. Yin. NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness” CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC), 2004.
-
(2004)
CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
Bearavolu, R.4
Li, Y.5
Yin, X.6
-
22
-
-
33845545586
-
Elisha: A Visual-based anomaly detection System
-
S. T. Teoh et al. Elisha: a Visual-based Anomaly Detection System. RAID, 2002.
-
(2002)
RAID
-
-
Teoh, S.T.1
-
23
-
-
0242676079
-
A visual exploration process for the analysis of internet routing data
-
S. T. Teoh, K. Ma, S. F. Wu. A Visual Exploration Process for the Analysis of Internet Routing Data. IEEE Visualization, 2003.
-
(2003)
IEEE Visualization
-
-
Teoh, S.T.1
Ma, K.2
Wu, S.F.3
-
25
-
-
13944272563
-
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP
-
S. T. Teoh, K. Zhang, S. Tseng, K. Ma, S. F. Wu. Combining Visual and Automated Data Mining for Near-Real-Time Anomaly Detection and Analysis in BGP. CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC), 2004.
-
(2004)
CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
-
-
Teoh, S.T.1
Zhang, K.2
Tseng, S.3
Ma, K.4
Wu, S.F.5
-
26
-
-
1642339982
-
Probabilistic alert correlation
-
A. Valdes, K. Skinner. Probabilistic Alert Correlation. RAID, 2001.
-
(2001)
-
-
Valdes, A.1
Skinner, K.2
-
27
-
-
2442586852
-
Selecting log data sources to correlate attack traces for computer network security: Preliminary results
-
X. Yin, K. Lakkaraju, Y. Li, W. Yurcik. Selecting Log Data Sources to Correlate Attack Traces for Computer Network Security: Preliminary Results. 11th Intl. Conf. on Telecom. Systems, 2003.
-
(2003)
11th Intl. Conf. On Telecom. Systems
-
-
Yin, X.1
Lakkaraju, K.2
Li, Y.3
Yurcik, W.4
-
28
-
-
2442480533
-
VisflowConnect: Providing security situational awareness by visualizing network traffic flows
-
X. Yin, W. Yurcik, Y. Li, K. Lakkaraju, C. Abad. VisFlowConnect: Providing Security Situational Awareness by Visualizing Network Traffic Flows. Workshop on Information Assurance (WIA 04) held in conjunction with IPCCC 2004, 2004.
-
(2004)
Workshop on Information Assurance (WIA 04) Held in Conjunction with IPCCC 2004
-
-
Yin, X.1
Yurcik, W.2
Li, Y.3
Lakkaraju, K.4
Abad, C.5
-
29
-
-
13944256121
-
VisflowConnect: Netflow visualization of link relationships for security situational awareness
-
X. Yin, W. Yurcik, M. Treaster, Y. Li, K. Lakkaraju. VisFlowConnect: NetFlow Visualization of Link Relationships for Security Situational Awareness. VizSEC/DMSEC, 2004.
-
(2004)
VizSEC/DMSEC
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
|