2006
DOI: 10.1109/mcg.2006.49
|View full text |Cite
|
Sign up to set email alerts
|

Visual correlation of network alerts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(43 citation statements)
references
References 10 publications
0
43
0
Order By: Relevance
“…Rigorous scientific testing has demonstrated that dwelling in such data representation architectures allows people (i.e., network managers, traders, anesthesiologists, etc.) to make more accurate, faster, and better decisions than with existing systems [26,37,30,[42][43][44][53][54][55][56][57][58]. And they can do so while with reducing their cognitive load, stress, and training time.…”
Section: Discussionmentioning
confidence: 99%
“…Rigorous scientific testing has demonstrated that dwelling in such data representation architectures allows people (i.e., network managers, traders, anesthesiologists, etc.) to make more accurate, faster, and better decisions than with existing systems [26,37,30,[42][43][44][53][54][55][56][57][58]. And they can do so while with reducing their cognitive load, stress, and training time.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, providing a meaningful visualization requires having a good understanding of the user, the problem, and the information to is a visualization tool that integrates log and alert files into an intuitive visualization that is a mix between a topology map and concentric circles around the outside similar to a ring chart. This visualization shows alert type by colorger node size to show more alerts, and a larger REFLEX is a solution where user, application, source, and coordinates in order to show the relationships between the occurring events [24].…”
Section: ) Datamentioning
confidence: 99%
“…Applications like MieLog [19] or Tudumi [20] use logs collected directly on the endpoints. On the other hand, RainStorm [1], SnortView [13], STARMINE [12], VisAlert [8], or other visualization-based tools that use an hybrid approach [11], visualize alarms generated by traditional security systems (e.g, IDS). This last kind of systems are the most similar to ours in that they visually correlate alarms and network resources.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Current prototypes focus on visualizing (in near real time) either network traffic [25] [14][6] [9] or network alarms [1] [13] [8], rarely a mix of them, and to place them in a context that helps in understanding their nature. Some of them use raw data coming from traffic logs, some others employ preprocessed/digested data.…”
Section: Introductionmentioning
confidence: 99%