DocumentCode :
1102108
Title :
Detecting flaws and intruders with visual data analysis
Author :
Teoh, Soon Tee ; Ma, Kwan-Liu ; Wu, Soon Felix ; Jankun-Kelly, T.J.
Author_Institution :
California Univ., Davis, CA, USA
Volume :
24
Issue :
5
fYear :
2004
Firstpage :
27
Lastpage :
35
Abstract :
The task of sifting through large amounts of data to find useful information spawned the field of data mining. Most data mining approaches are based on machine-learning techniques, numerical analysis, or statistical modeling. They use human interaction and visualization only minimally. Such automatic methods can miss some important features of the data. Incorporating human perception into the data mining process through interactive visualization can help us better understand the complex behaviors of computer network systems. This article describes visual-analytics-based solutions and outlines a visual exploration process for log analysis. Three log-file analysis applications demonstrate our approach´s effectiveness in discovering flaws and intruders in network systems.
Keywords :
data analysis; data mining; data visualisation; security of data; data mining; flaws detection; human interaction; intruders; log-file analysis; machine-learning; visual data analysis; Application software; Computer networks; Data analysis; Data mining; Data security; Data visualization; Humans; Intrusion detection; Performance analysis; Visual analytics; Internet routing stability; information visualization; intrusion detection; network visualization; visual data mining; Computer Communication Networks; Computer Graphics; Computer Security; Database Management Systems; Databases, Factual; Information Storage and Retrieval; Online Systems; Software; User-Computer Interface;
fLanguage :
English
Journal_Title :
Computer Graphics and Applications, IEEE
Publisher :
ieee
ISSN :
0272-1716
Type :
jour
DOI :
10.1109/MCG.2004.26
Filename :
1333625
Link To Document :
بازگشت