Share Email Print
cover

Proceedings Paper

Analysis and application of node layout algorithms for intrusion detection
Author(s): Robert F. Erbacher; Zhouxuan Teng
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

The need to monitor today's networked computer systems for security purposes is a major concern. Our monitoring environment aids system administrators in keeping track of the activities on such systems with much lower time requirements than that of perusing typical log files. With many systems connected to the network the task becomes significantly more difficult. If an attack is identified on one system then all systems have likely been attacked. The ability to correlate activity among multiple machines is critical for complete analysis and monitoring of the environment. Developing an effective organization of the nodes (systems) on the display is a nontrivial task. The organization must clearly show activity on all systems simultaneously while not cluttering the display or unnecessarily distracting the user. This paper discusses the layout techniques we have experimented with and their effectiveness.

Paper Details

Date Published: 9 June 2003
PDF: 11 pages
Proc. SPIE 5009, Visualization and Data Analysis 2003, (9 June 2003); doi: 10.1117/12.473927
Show Author Affiliations
Robert F. Erbacher, Univ. at Albany (United States)
Zhouxuan Teng, Univ. at Albany (United States)


Published in SPIE Proceedings Vol. 5009:
Visualization and Data Analysis 2003
Robert F. Erbacher; Philip C. Chen; Jonathan C. Roberts; Matti T. Groehn; Katy Boerner, Editor(s)

© SPIE. Terms of Use
Back to Top