DocumentCode
1102108
Title
Detecting flaws and intruders with visual data analysis
Author
Teoh, Soon Tee ; Ma, Kwan-Liu ; Wu, Soon Felix ; Jankun-Kelly, T.J.
Author_Institution
California Univ., Davis, CA, USA
Volume
24
Issue
5
fYear
2004
Firstpage
27
Lastpage
35
Abstract
The task of sifting through large amounts of data to find useful information spawned the field of data mining. Most data mining approaches are based on machine-learning techniques, numerical analysis, or statistical modeling. They use human interaction and visualization only minimally. Such automatic methods can miss some important features of the data. Incorporating human perception into the data mining process through interactive visualization can help us better understand the complex behaviors of computer network systems. This article describes visual-analytics-based solutions and outlines a visual exploration process for log analysis. Three log-file analysis applications demonstrate our approach´s effectiveness in discovering flaws and intruders in network systems.
Keywords
data analysis; data mining; data visualisation; security of data; data mining; flaws detection; human interaction; intruders; log-file analysis; machine-learning; visual data analysis; Application software; Computer networks; Data analysis; Data mining; Data security; Data visualization; Humans; Intrusion detection; Performance analysis; Visual analytics; Internet routing stability; information visualization; intrusion detection; network visualization; visual data mining; Computer Communication Networks; Computer Graphics; Computer Security; Database Management Systems; Databases, Factual; Information Storage and Retrieval; Online Systems; Software; User-Computer Interface;
fLanguage
English
Journal_Title
Computer Graphics and Applications, IEEE
Publisher
ieee
ISSN
0272-1716
Type
jour
DOI
10.1109/MCG.2004.26
Filename
1333625
Link To Document