Show simple item record

dc.contributor.authorAtkison, Travisen_US
dc.contributor.authorPensy, Kathleenen_US
dc.contributor.authorNicholas, Charlesen_US
dc.contributor.authorEbert, Daviden_US
dc.contributor.authorAtkison, Rebekahen_US
dc.contributor.authorMorris, Chrisen_US
dc.contributor.editorDavid S. Ebert and Jean M. Favre and Ronald Peikerten_US
dc.date.accessioned2014-01-30T06:46:01Z
dc.date.available2014-01-30T06:46:01Z
dc.date.issued2001en_US
dc.identifier.isbn3-211-83674-8en_US
dc.identifier.issn1727-5296en_US
dc.identifier.urihttp://dx.doi.org/10.2312/VisSym/VisSym01/283-290en_US
dc.description.abstractWe describe our efforts to analyze network intrusion detection data using information retrieval and visualization tools. By regarding Telnet sessions as documents, which may or may not include attacks, a session that contains a certain type of attack can be used as a query, allowing us to search the data for other instances of that same type of attack. The use of information visualization techniques allows us to quickly and clearly find the attacks and also find similar, potentially new types of attacks.en_US
dc.publisherThe Eurographics Associationen_US
dc.titleCase Study: Visualization and Information Retrieval Techniques for Network Intrusion Detectionen_US
dc.description.seriesinformationEurographics / IEEE VGTC Symposium on Visualizationen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record