Incorporating human perception into the data mining process through interactive visualization can help in better understanding the complex behaviors of computer network systems. This paper illustrates three visualization based methods for detecting network flaws and intrusions. All three applications require appropriate visualization tools and interaction techniques. Because the nature of the data, the task, and the desired knowledge are all different, the visual metaphors used in each of the applications also differ.
ASJC Scopus subject areas
- Computer Graphics and Computer-Aided Design