The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (2004 vol. 24)
ISSN: 0272-1716
pp: 27-35
Soon Tee Teoh , University of California, Davis
Kwan-Liu Ma , University of California, Davis
Soon Felix Wu , University of California, Davis
T.J. Jankun-Kelly , Mississippi State University
To ensure the normal operation of a large computer network system, the common practice is to constantly collect system logs and analyze the network activities for detecting anomalies. Most of the analysis methods in use today are highly automated due to the enormous size of the collected data. Conventional automated methods are largely based on statistical modeling, and some employ machine learning. This article presents interactive visualization as an alternative and effective data exploration method for understanding the complex behaviors of computer network systems. It describes three log-file analysis applications, and demonstrates how the use of the authors' visualization-centered tools can lead to the discovery of flaws and intruders in the network systems.
information visualization, intrusion detection, visual data mining, network visualization, Internet routing stability

K. Ma, S. F. Wu, T. Jankun-Kelly and S. T. Teoh, "Detecting Flaws and Intruders with Visual Data Analysis," in IEEE Computer Graphics and Applications, vol. 24, no. , pp. 27-35, 2004.
91 ms
(Ver 3.3 (11022016))