Detecting flaws and intruders with visual data analysis

Soon Tee Teoh, Kwan-Liu Ma, Soon Felix Wu, T. J. Jankun-Kelly

Research output: Contribution to journalArticle

45 Scopus citations

Abstract

Incorporating human perception into the data mining process through interactive visualization can help in better understanding the complex behaviors of computer network systems. This paper illustrates three visualization based methods for detecting network flaws and intrusions. All three applications require appropriate visualization tools and interaction techniques. Because the nature of the data, the task, and the desired knowledge are all different, the visual metaphors used in each of the applications also differ.

Original languageEnglish (US)
Pages (from-to)27-35
Number of pages9
JournalIEEE Computer Graphics and Applications
Volume24
Issue number5
DOIs
StatePublished - Sep 1 2004

    Fingerprint

ASJC Scopus subject areas

  • Software
  • Medicine(all)
  • Computer Graphics and Computer-Aided Design

Cite this