Proceedings of the Tenth Workshop on Visualization for Cyber Security 2013
DOI: 10.1145/2517957.2517966
|View full text |Cite
|
Sign up to set email alerts
|

Finding anomalies in time-series using visual correlation for interactive root cause analysis

Abstract: Monitoring computer networks often includes gathering vast amounts of time-series data from thousands of computer systems and network devices. Threshold alerting is easy to accomplish with state-of-the-art technologies. However, to find correlations and similar behaviors between the different devices is challenging. We developed a visual analytics application to tackle this challenge by integrating similarity models and analytics combined with well-known, but taskadapted, time-series visualizations. We show in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…We shed light on single techniques that are most closely related. Stoffel et al present a client‐server visual analytics systems for anomaly detection in computer networks [SFK13]. Its main views show a collection of vertically oriented line charts that are compared with a reference model of the data.…”
Section: Related Workmentioning
confidence: 99%
“…We shed light on single techniques that are most closely related. Stoffel et al present a client‐server visual analytics systems for anomaly detection in computer networks [SFK13]. Its main views show a collection of vertically oriented line charts that are compared with a reference model of the data.…”
Section: Related Workmentioning
confidence: 99%
“…Results from different anomaly detection approaches have been visualized in different ways. Stoffel et al provide a visualization combining multiple data sources that monitor a computer network [27]. Their visualization relies on well-known time series visualizations.…”
Section: Anomaly Detection In Time Seriesmentioning
confidence: 99%
“…Since the analyst can specify queries, this means the problem space is not confined, however it does rely on the creation of well-defined queries by the analyst to identify insider threat behaviour. Stoffel et al [23] propose a visual analytics application for identifying correlations between different networked devices, based on time-series anomaly detection and similarity models. They focus primarily at the network traffic level, and so they do not currently consider other attributes related to insider threat such as file storage systems and USB connected devices.…”
Section: Related Workmentioning
confidence: 99%