메뉴 건너뛰기




Volumn , Issue , 2005, Pages 141-153

The design of VisflowConnect-IP: A link analysis system for IP security situational awareness

Author keywords

Link analysis; NetFlow; Security situational awareness; Security visualization

Indexed keywords

DATA VISUALIZATION; DESIGN; DYNAMICS; INTERNET PROTOCOLS; NETWORK ARCHITECTURE; NETWORK SECURITY; VISUALIZATION;

EID: 84899508937     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (31)

References (30)
  • 5
    • 3142657520 scopus 로고    scopus 로고
    • A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks
    • R. Bearavolu, K. Lakkaraju, W. Yurcik, H. Raje. A Visualization Tool for Situational Awareness of Tactical and Strategic Security Events on Large and Complex Computer Networks. IEEE Milcom, 2003.
    • (2003) IEEE Milcom
    • Bearavolu, R.1    Lakkaraju, K.2    Yurcik, W.3    Raje, H.4
  • 9
    • 0002766331 scopus 로고    scopus 로고
    • 3D geographic network displays
    • K. Cox, S. Eick, T. He. 3D Geographic Network Displays. ACM SIGMOD Record, 25(4):50-54, 1996.
    • (1996) ACM SIGMOD Record , vol.25 , Issue.4 , pp. 50-54
    • Cox, K.1    Eick, S.2    He, T.3
  • 12
    • 0242529344 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion detection alerts
    • H. Debar, A. Wespi. Aggregation and Correlation of Intrusion Detection Alerts. RAID, 2001.
    • (2001) RAID
    • Debar, H.1    Wespi, A.2
  • 14
    • 84997930789 scopus 로고
    • Navigating large networks with hierarchies
    • S. Eick, G. Wills. Navigating Large Networks with Hierarchies. IEEE Visualization, 1993.
    • (1993) IEEE Visualization
    • Eick, S.1    Wills, G.2
  • 16
    • 85117717445 scopus 로고    scopus 로고
    • The network vulnerability tool (NVT) - A system vulnerability visualization architecture
    • R. Henning, K. Fox. The Network Vulnerability Tool (NVT) - A System Vulnerability Visualization Architecture. NISSC, 2000.
    • (2000) NISSC
    • Henning, R.1    Fox, K.2
  • 20
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • W. Lee, D. Xiang. Information-Theoretic Measures for Anomaly Detection. IEEE Sym. on Sec. and Privacy, 2001.
    • (2001) IEEE Sym. On Sec. On Privacy
    • Lee, W.1    Xiang, D.2
  • 22
    • 33845545586 scopus 로고    scopus 로고
    • Elisha: A Visual-based anomaly detection System
    • S. T. Teoh et al. Elisha: a Visual-based Anomaly Detection System. RAID, 2002.
    • (2002) RAID
    • Teoh, S.T.1
  • 23
    • 0242676079 scopus 로고    scopus 로고
    • A visual exploration process for the analysis of internet routing data
    • S. T. Teoh, K. Ma, S. F. Wu. A Visual Exploration Process for the Analysis of Internet Routing Data. IEEE Visualization, 2003.
    • (2003) IEEE Visualization
    • Teoh, S.T.1    Ma, K.2    Wu, S.F.3
  • 24
  • 26
    • 1642339982 scopus 로고    scopus 로고
    • Probabilistic alert correlation
    • A. Valdes, K. Skinner. Probabilistic Alert Correlation. RAID, 2001.
    • (2001)
    • Valdes, A.1    Skinner, K.2
  • 27
    • 2442586852 scopus 로고    scopus 로고
    • Selecting log data sources to correlate attack traces for computer network security: Preliminary results
    • X. Yin, K. Lakkaraju, Y. Li, W. Yurcik. Selecting Log Data Sources to Correlate Attack Traces for Computer Network Security: Preliminary Results. 11th Intl. Conf. on Telecom. Systems, 2003.
    • (2003) 11th Intl. Conf. On Telecom. Systems
    • Yin, X.1    Lakkaraju, K.2    Li, Y.3    Yurcik, W.4
  • 29
    • 13944256121 scopus 로고    scopus 로고
    • VisflowConnect: Netflow visualization of link relationships for security situational awareness
    • X. Yin, W. Yurcik, M. Treaster, Y. Li, K. Lakkaraju. VisFlowConnect: NetFlow Visualization of Link Relationships for Security Situational Awareness. VizSEC/DMSEC, 2004.
    • (2004) VizSEC/DMSEC
    • Yin, X.1    Yurcik, W.2    Treaster, M.3    Li, Y.4    Lakkaraju, K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.