Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection
dc.contributor.author | Atkison, Travis | en_US |
dc.contributor.author | Pensy, Kathleen | en_US |
dc.contributor.author | Nicholas, Charles | en_US |
dc.contributor.author | Ebert, David | en_US |
dc.contributor.author | Atkison, Rebekah | en_US |
dc.contributor.author | Morris, Chris | en_US |
dc.contributor.editor | David S. Ebert and Jean M. Favre and Ronald Peikert | en_US |
dc.date.accessioned | 2014-01-30T06:46:01Z | |
dc.date.available | 2014-01-30T06:46:01Z | |
dc.date.issued | 2001 | en_US |
dc.description.abstract | We describe our efforts to analyze network intrusion detection data using information retrieval and visualization tools. By regarding Telnet sessions as documents, which may or may not include attacks, a session that contains a certain type of attack can be used as a query, allowing us to search the data for other instances of that same type of attack. The use of information visualization techniques allows us to quickly and clearly find the attacks and also find similar, potentially new types of attacks. | en_US |
dc.description.seriesinformation | Eurographics / IEEE VGTC Symposium on Visualization | en_US |
dc.identifier.isbn | 3-211-83674-8 | en_US |
dc.identifier.issn | 1727-5296 | en_US |
dc.identifier.uri | https://doi.org/10.2312/VisSym/VisSym01/283-290 | en_US |
dc.publisher | The Eurographics Association | en_US |
dc.title | Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection | en_US |
Files
Original bundle
1 - 1 of 1