Visualization in detection of intrusions and misuse in large scale networks

被引:11
作者
Erbacher, RF [1 ]
Frincke, D [1 ]
机构
[1] SUNY Albany, Dept Comp Sci, Albany, NY 12222 USA
来源
2000 IEEE INTERNATIONAL CONFERENCE ON INFORMATION VISUALISATION, PROCEEDINGS | 2000年
关键词
D O I
10.1109/IV.2000.859771
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Internet is quickly becoming entrenched in the communication and commercial sectors of everyday life. With this movement away from traditional fixed infrastructure we are also moving away from the traditional securities placed within fixed infrastructure. This has led to increasing numbers of attacks designed to infiltrate or disrupt the activities being performed by companies and individuals on the Internet. We are exploring the applicability of visualization techniques in conjunction with a well-known intrusion detection system (Hummer) for the detection and analysis of misuse of computer systems connected to the Internet. The visualization techniques will allow users to identify the behavior of users connecting to the system and identify those whose intentions are unwelcome.
引用
收藏
页码:294 / 299
页数:2
相关论文
共 18 条
[1]  
BECKER RA, 1993, IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS 93 : TECHNICAL PROGRAM, CONFERENCE RECORD, VOLS 1-3, P946, DOI 10.1109/ICC.1993.397410
[2]  
COX K, ACM SIGMOD RECORD, V25, P50
[3]  
ERBACHER RF, THESIS U MASSACHUSET
[4]  
Frincke D., 1998, P 21 NIST NCSC NAT I, P361
[5]  
GRINSTEIN G, 1997, P IEEE VIS 97 C, P511
[6]  
GROSS M, 1994, VISUAL COMPUTING INT
[7]   Constructing interactive network visual interfaces [J].
He, TS ;
Eick, SG .
BELL LABS TECHNICAL JOURNAL, 1998, 3 (02) :47-57
[8]  
KO C, 1993, ACM C COMP COMM SEC, V1
[9]  
PICCIOTTO J, 1987, DESIGN EFFECTIVE AUD
[10]   On encouraging multiple views for visualization [J].
Roberts, JC .
1998 IEEE CONFERENCE ON INFORMATION VISUALIZATION - PROCEEDINGS, 1998, :8-14