Weaving a carpet from log entries: A network security visualization built with co-creation.
Johannes LandstorferIvo HerrmannJan-Erik StangeMarian DörkReto WettachPublished in: IEEE VAST (2014)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- network traffic
- dos attacks
- anomaly detection
- security policies
- security breaches
- information security
- risk assessment
- data analysis
- computer security
- network intrusion
- ip networks
- end hosts
- packet filtering
- security protection
- network administrators
- databases
- anti phishing
- cyber security
- denial of service
- situation assessment
- wired networks
- network monitoring
- network attacks
- network management
- association rules
- learning algorithm
- data mining