Title :
Visual Analytics for Network Flow Analysis
Author :
Goodall, John R. ; Tesone, Daniel R.
Abstract :
Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming - a billion flow records a day for large organizations is not abnormal. We have integrated our visual analytics toolkit with network flow data to provide a seamless workflow for computer network defense analysts. This integration can facilitate the learning process of novice analysts and make expert analysts more productive.
Keywords :
computer networks; security of data; computer network defense analysts; cyber infrastructure; malicious network attacks; network flow analysis; visual analytics; Computer networks; Computer security; Data analysis; Data visualization; Government; Information analysis; Military computing; Telecommunication traffic; Terrorism; Visual analytics; Network Data Visualization; information assurance; network flow analysis; visualization system;
Conference_Titel :
Conference For Homeland Security, 2009. CATCH '09. Cybersecurity Applications & Technology
Conference_Location :
Washington, DC
Print_ISBN :
978-0-7695-3568-5
DOI :
10.1109/CATCH.2009.47