2014 International Conference on Data and Software Engineering (ICODSE) 2014
DOI: 10.1109/icodse.2014.7062673
|View full text |Cite
|
Sign up to set email alerts
|

Information system log visualization to monitor anomalous user activity based on time

Abstract: As information systems start to manage the more crucial parts of human lives, their security cannot be neglected. One way to ensure the security is by analyzing their generated log files of anomalous user activity. Data visualization has become a common solution to help get around the problems in log analysis. In this paper, we tried to determine key characteristics of effective data visualization on detecting those anomalous user activity recorded in log files. First we analyzed the log data we have and deriv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Gamachchi et al [ 27 ] used histograms and frequency line graphs to visualize individual logon-logoff behavior, while Legg et al [ 28 ] used circular heatmaps with color indicators to visualize login frequencies. Hanniel et al [ 29 ] used dot maps to visualize anomalous user activity based on time.…”
Section: Related Workmentioning
confidence: 99%
“…Gamachchi et al [ 27 ] used histograms and frequency line graphs to visualize individual logon-logoff behavior, while Legg et al [ 28 ] used circular heatmaps with color indicators to visualize login frequencies. Hanniel et al [ 29 ] used dot maps to visualize anomalous user activity based on time.…”
Section: Related Workmentioning
confidence: 99%