• DocumentCode
    1102108
  • Title

    Detecting flaws and intruders with visual data analysis

  • Author

    Teoh, Soon Tee ; Ma, Kwan-Liu ; Wu, Soon Felix ; Jankun-Kelly, T.J.

  • Author_Institution
    California Univ., Davis, CA, USA
  • Volume
    24
  • Issue
    5
  • fYear
    2004
  • Firstpage
    27
  • Lastpage
    35
  • Abstract
    The task of sifting through large amounts of data to find useful information spawned the field of data mining. Most data mining approaches are based on machine-learning techniques, numerical analysis, or statistical modeling. They use human interaction and visualization only minimally. Such automatic methods can miss some important features of the data. Incorporating human perception into the data mining process through interactive visualization can help us better understand the complex behaviors of computer network systems. This article describes visual-analytics-based solutions and outlines a visual exploration process for log analysis. Three log-file analysis applications demonstrate our approach´s effectiveness in discovering flaws and intruders in network systems.
  • Keywords
    data analysis; data mining; data visualisation; security of data; data mining; flaws detection; human interaction; intruders; log-file analysis; machine-learning; visual data analysis; Application software; Computer networks; Data analysis; Data mining; Data security; Data visualization; Humans; Intrusion detection; Performance analysis; Visual analytics; Internet routing stability; information visualization; intrusion detection; network visualization; visual data mining; Computer Communication Networks; Computer Graphics; Computer Security; Database Management Systems; Databases, Factual; Information Storage and Retrieval; Online Systems; Software; User-Computer Interface;
  • fLanguage
    English
  • Journal_Title
    Computer Graphics and Applications, IEEE
  • Publisher
    ieee
  • ISSN
    0272-1716
  • Type

    jour

  • DOI
    10.1109/MCG.2004.26
  • Filename
    1333625