![]() In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC ’04, pp. ACM, New York (2004)īall, R., Fink, G.A., North, C.: Home-centric visualization of network traffic for security administration. McPherson, J., Ma, K.L., Krystosk, P., Bartoletti, T., Christensen, M.: Portvis: A tool for port-based detection of security events. In: Proceedings of Seventh Annual IEEE Visualization ’96, pp. Grinstein, G., Piatetsky-Shapiro, G., Wills, G.: Information exploration shootout or “benchmarks for information exploration”. USENIX Association, Berkeley, CA, USA (1999) In: Proceedings of the 1st Conference on Workshop on Intrusion Detection and Network Monitoring-Volume 1, ID’99, pp. Girardin, L.: An eye on network intruder-administrator shootouts. Harrison, L., Lu, A.: The future of security visualization: lessons from network visualization. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. Jeong, D.H., Jeong, B., Ji, S.: Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions. Ji, S.Y., Jeong, B.K., Choi, S., Jeong, D.H.: A multi-level intrusion detection method for abnormal network behaviors. Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. ![]() ![]() In: OSDI’04: Proceedings of the 6th Conference on Symposium on Operating Systems Design and Implementation. ĭean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Keegan, N., Ji, S.Y., Chaudhary, A., Concolato, C., Yu, B., Jeong, D.H.: A survey of cloud-based network intrusion detection analysis. In: International Conference on Fuzzy Systems, pp. To determine the effectiveness of the four visualization approaches, we developed several prototype visualizations and examined the complexity of implementation, requirement of data preprocessing, understandability of network patterns, and identifiability of abnormal network events.Įlshoush, H.T., Osman, I.M.: Reducing false positives through fuzzy alert correlation in collaborative intelligent intrusion detection systems: a review. From the review, we identified four key approaches that should be utilized in designing an effective network traffic visualization system: data filtration and transformation, pixel-based visualization, graph representation, and coordinated multi-views. In this paper, we performed in-depth literature review on visualization techniques for network traffic data analysis. However, the effectiveness of visualization techniques for network traffic data analysis has not been fully examined. To address this limitation, several visualization systems have been designed, which aim to enhance the ability of understanding data visually. Various computational methods are proposed to discover unknown attacks, but validating suspicious activities and understanding their unique characteristics are still difficult. A Southbound HOV project remains though and will begin in February 2019 which will in part create a new bridge across the Puyallup River on I-5 south.Ĭonstruction also continues on revamping the I-5/SR-16 interchanges and should be finished up in the spring.Designing innovative approaches to detect intrusive network activities is considered as one of the most significant research topics in network security. Not only did this project widen I-5 to make room for HOV lanes, it replaced all the original concrete with a new roadway surface, rebuilt the Pacific Avenue overpass and built a new bridge over I-705."Īlso nearing completion is a three-year I-5 HOV project that widened I-5 and created a new Puyallup River Bridge and ramp to SR-167, Mitchell said. "The ramp from eastbound SR 16 to northbound I-5 now has two lanes for travelers to use instead of one. Kuney Construction, the contractor who is building the East McKinley Way overpass, has put both directions of I-5 into its final configuration within the project limits," writes Cara Mitchell with the WSDOT. "In the first two weeks of October, Max J. ![]() They're down to the "Final Four" now, and two of those are "weeks away" from completion.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |