References
- E.W. Bethel et al., "Accelerating Network Traffic Analytics Using Query-Driven Visualization," IEEE Symp. Vis. Anal. Sci. Technol., 2006, pp. 115-122.
- A. Wagner and B. Plattner, "Entropy Based Worm and Anomaly Detection in Fast IP Networks," Proc. 14th IEEE Int. WET ICE, 2005, pp. 172-177.
- J. Kim, S. Radhakrishnan, and J. Jang, "Cost Optimization in SIS Model of Worm Infection," ETRI J., vol. 28, no. 5, Oct. 2006, pp. 692-695. https://doi.org/10.4218/etrij.06.0206.0026
- J. Lee et al., "PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems," ETRI J., vol. 31, no. 5, Oct. 2009, pp. 554-564. https://doi.org/10.4218/etrij.09.0108.0578
- K. Lakkaraju, W. Yurcik, and A.J. Lee, "NVisionIP: Netflow Visualizations of System State for Security Situational Awareness," Proc. ACM Workshop VizSEC/DMSEC, 2004, pp. 65-72.
- X. Yin, W. Yurcik, and A. Slagell, "The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness," Proc. 3rd IEEE Int. Workshop Inf. Assurance, 2005, pp. 141-153.
- H. Koike and K. Ohno "SnortView: Visualization System of Snort Logs," Proc. ACM Workshop VizSEC/DMSEC, 2004, pp. 143-147.
- J. Mcpherson et al., "Portvis: A Tool for Port-Based Detection of Security Events," Proc. ACM Workshop VizSEC/DMSEC, 2004, pp. 73-81.
- K. Abdullah et al., "IDS RainStorm: Visualizing IDS Alarms," Proc. IEEE Vis. Comput. Security, 2005, pp. 1-10.
- Le Malécot et al., "Interactively Combining 2D and 3D Visualization for Network Traffic Monitoring," Proc. 3rd ACM Int. Workshop Vis. Comput. Security, 2006, pp. 123-127.
- R. Ball, G.A. Fink, and C. North, "Home-Centric Visualization of Network Traffic for Security Administration," Proc. ACM Workshop VizSEC/DMSEC, 2004, pp. 55-64.
- P. Ren et al., "IDGraphs: Intrusion Detection and Analysis Using Histographs," Proc. IEEE Vis. Comput. Security, 2005, pp. 39-46.
- S. Lau, "The Spinning Cube of Potential Doom," Comm. ACM, vol. 47, no. 6, June 2004, pp. 25-26. https://doi.org/10.1145/990680.990699
- Y. Hu, "Adaptive Flow Aggregation-A New Solution for Robust Flow Monitoring under Security Attacks," Proc. 10th IEEE/IFIP Netw. Operations Manage. Symp., 2006, pp. 424-435.
- S. Krasser et al., "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization," Proc. 6th IEEE Info. Assurance Workshop, 2005, pp. 42-49.
- A. Giani et al., "Attribution and Aggregation of Network Flows for Security Analysis," Proc. 3rd CERT/CC Annual Workshop Flow Anal., 2006.
Cited by
- 트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화 vol.11, pp.4, 2011, https://doi.org/10.17662/ksdim.2015.11.4.047