2013
DOI: 10.1117/12.2037790
|View full text |Cite
|
Sign up to set email alerts
|

VAFLE: visual analytics of firewall log events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…When there is a large number of time series sharing the same variable (univariate time series) or the same combination of variables (multivariate time series), clustering may be applied to reduce the number of time series by grouping similar series and taking a representative time series from each group. K‐means [Gho+14] and spectral clustering [NJW02] methods have been utilized for this purpose and resulted in much simpler representations although the choice of appropriate parameter settings may be difficult.…”
Section: Methods Classificationmentioning
confidence: 99%
“…When there is a large number of time series sharing the same variable (univariate time series) or the same combination of variables (multivariate time series), clustering may be applied to reduce the number of time series by grouping similar series and taking a representative time series from each group. K‐means [Gho+14] and spectral clustering [NJW02] methods have been utilized for this purpose and resulted in much simpler representations although the choice of appropriate parameter settings may be difficult.…”
Section: Methods Classificationmentioning
confidence: 99%
“…Later advances increased the amount and complexity of log data that could be visualized. Work in network security visualization, such as VAFLE [10], focus on analyzing raw packet captures, IDS alerts, firewall logs, etc. Our work is closer to another thread of work that analyzes logs to learn about user behavior.…”
Section: Visual Log Analysismentioning
confidence: 99%
“…The same strategy was presented by Temporal Trends [4] and Heatmap Grids [9], but now it is applied in a different context. In the TAM layout, the node degree at each time stamp is computed for all nodes at all times and the highest degree is taken as the maximum value of the activity range, that is used to map the color of nodes.…”
Section: Temporal Activity Mapmentioning
confidence: 99%
“…Other methods to enhance visual pattern detection in dynamic networks include employing 'piling' metaphors [3], adjacency lists, or representing network snapshots as high-dimensional points that are projected in two dimensions [20]. There are also strategies as Temporal Trends [4] and Heatmap Grids [9] that are used to perform visual analytics of firewall log events and dense networks in astronomy and neurology, respectively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation