Proceedings 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. HAPTICS 2002
DOI: 10.1109/haptic.2002.998969
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration

Abstract: The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive/immersive technologies. In this paper, we explore several network visualization techniques geared towards intrusion detection on small and large-scale networks. We also examine the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
31
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…Most of the solutions described in this section use a glyph metaphor [28,38,46] to encode information by changing different features (colour, size, opacity, etc.) in addition to the spatial coordinates, while others use traditional representation techniques such as histograms [25,47,48], histographs [39] or other graphs [29,32].…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the solutions described in this section use a glyph metaphor [28,38,46] to encode information by changing different features (colour, size, opacity, etc.) in addition to the spatial coordinates, while others use traditional representation techniques such as histograms [25,47,48], histographs [39] or other graphs [29,32].…”
Section: Previous Workmentioning
confidence: 99%
“…The Time-based Network Traffic Visualizer [31] combines a matrix display of host IP address and packets timestamp. IP segments are used in NIVA [38] to locate and colour the data.…”
Section: Previous Workmentioning
confidence: 99%
“…Various visualization techniques have been also applied in the field of IDSs [2], [31], [42] , [52], [53], [56] to tackle this issue by providing a visual depiction of the network topology, ID logs, network statistics or some other info. The proposed model goes further and offers a complete and more intuitive visualization of network traffic by depicting each simple packet and providing the network administrator with a snapshot of network traffic and protocol interactions to identify anomalous situations.…”
Section: Previous Work On Intrusion Detectionmentioning
confidence: 99%
“…2002]. Drill-down techniques are often useful to obtain details about particular items -these are the details on demand [Marty, 2009& Nyarko et al, 2002.…”
Section: Introductionmentioning
confidence: 99%
“…Visualization leverages the innate human capability for pattern recognition to increase the effectiveness, understanding, and speed of response to network security threats. "Visualization is a powerful link between the two most dominant information-processing systems, the human mind and the modern computer" [Nyarko, et al, 2002].…”
Section: Introductionmentioning
confidence: 99%