Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
The Internet has become a wild place: malicious code is spread on personal computers across the world, deploying botnets ready to attack the network infrastructure. The vast number of security incidents and other anomalies overwhelms attempts at manual analysis, especially when monitoring service pr...
Publié dans: | IEEE transactions on visualization and computer graphics. - 1996. - 13(2007), 6 vom: 01. Nov., Seite 1105-12 |
---|---|
Auteur principal: | |
Autres auteurs: | , , , |
Format: | Article |
Langue: | English |
Publié: |
2007
|
Accès à la collection: | IEEE transactions on visualization and computer graphics |
Sujets: | Journal Article |