Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security 2004
DOI: 10.1145/1029208.1029232
|View full text |Cite
|
Sign up to set email alerts
|

SnortView

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…However, in this method, unlike VisAlert, although attackers are displayed, no information about the target of the attacks is presented to the user. SnortView [33] visualization is composed of three frames: attacker's frame, alert's frame, and attacker-destination matrix frame. In this visualization, diferent symbols are used to display alert types.…”
Section: Ids Visualization Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, in this method, unlike VisAlert, although attackers are displayed, no information about the target of the attacks is presented to the user. SnortView [33] visualization is composed of three frames: attacker's frame, alert's frame, and attacker-destination matrix frame. In this visualization, diferent symbols are used to display alert types.…”
Section: Ids Visualization Methodsmentioning
confidence: 99%
“…As recent visualization techniques developed for visualizing IDS logs, we can refer to references [27][28][29][30][31][32][33][34][35]. Tere are several shortcomings associated with these paradigms that make them less efective.…”
Section: Introductionmentioning
confidence: 99%
“…SnortView [16] uses a source-time matrix to plot IDS events over time. Colour is used to indicate event severity, and network protocols are given distinct glyph identifiers.…”
Section: A Snortviewmentioning
confidence: 99%
“…For example, attack graphs were invented to analyze the overall network vulnerability and to generate a global view of network security against attacks [229][230][231][232]. By deploying network sensors at particular points in the Internet, monitoring systems were built to detect cyberthreats and statistically analyze the time, sources, and the types of attacks [233], and various visualization methods were developed to better understand the result of the detection and analysis [234][235][236][237]. Quite recently, a genetic epidemiology approach to cybersecurity was proposed to understand the factors that determine the likelihood that individual computers are compromised [238], and the general concept of cybersecurity dynamics was introduced [239].…”
Section: Introductionmentioning
confidence: 99%