DocumentCode :
2591814
Title :
Case Study: Visualization Methodology for Analysing Network Data
Author :
Ten, Doris Wong Hooi ; Ramadass, Sureswaran
Author_Institution :
Nat. Adv. IPv6 Centre (NAv6), Univ. Sains Malaysia, Minden, Malaysia
fYear :
2010
fDate :
24-26 March 2010
Firstpage :
482
Lastpage :
484
Abstract :
Existing monitoring methods have been used for network traffic and network malicious such as using a network monitoring system or network intrusion system. These systems mainly focus to capture traffic and anomaly data. After the capturing process, the data is visualized without doing any analysis on these captured network data. Besides, there are a number of tools with visualization techniques (e.g. Scatterplot, bar graph) that can be applied in the network monitoring system. The one-dimensional (1D), two-dimensional (2D), three-dimensional (3D) and high multidimensional data can be presented by using relevant visualization techniques. Most of the visualization techniques exist in generating the captured network data into informative graphical 2D or 3D view. However, there are no tools or systems that are able to identify as well as analyses the types of given network data and presents it into the robust and meaningful illustration based on user requirements. This paper explored a new algorithm that would be used to solve the constraints which have been mentioned above. We also presented how the algorithm can facilitate the current visualization methodology. By the end of this, our proposed methodology should be able to analyse different types of network data automatically and effectively.
Keywords :
data visualisation; security of data; telecommunication traffic; data network analysis; high multidimensional data; network intrusion system; network monitoring system; network traffic; one-dimensional data; three-dimensional data; two-dimensional data; visualization methodology; Computational modeling; Computer networks; Computerized monitoring; Data analysis; Data visualization; Intrusion detection; Multidimensional systems; Robustness; Scattering; Telecommunication traffic; automated visualization methodology; information visualization; network malicious; network traffic; visualization technique;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Modelling and Simulation (UKSim), 2010 12th International Conference on
Conference_Location :
Cambridge
Print_ISBN :
978-1-4244-6614-6
Type :
conf
DOI :
10.1109/UKSIM.2010.94
Filename :
5480468
Link To Document :
بازگشت