A REVIEW AND COMPARISON OF VISUALIZATION TECHNIQUES FOR NETWORK INTRUSION DETECTION SYSTEM

被引:0
|
作者
Zaki, Fakhrul Adli Mohd [1 ]
Saman, Md Yazid Mohd [1 ]
Megat, Megat Fakruddin [1 ]
机构
[1] Univ Malaysia Terengganu, Dept Comp Sci, Kuala Terengganu, Terengganu, Malaysia
关键词
Network Visualization; Intrusion Detection System; Network Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research attempt to explore suitable visualization techniques to distinguish malicious traffics from massive background traffics by using visual patterns, to which the human visual perception system is sensitive and can thus processes efficiently. The result from our experimentation will show that visualizing the network traffic using the developed prototype called NVIDS in the actual network environment will give more accurate outcome and the usability of the prototype.
引用
收藏
页码:407 / 414
页数:8
相关论文
共 50 条
  • [21] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [22] Methods and Techniques of Intrusion Detection: A Review
    Somya
    Bansal, Palak
    Ahmad, Tameem
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 518 - 529
  • [23] A Review on Intrusion Detection Systems and Techniques
    Bhati, Nitesh Singh
    Khari, Manju
    Garcia-Diaz, Vicente
    Verdu, Elena
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2020, 28 (Supp02) : 65 - 91
  • [24] A systematic literature review for network intrusion detection system (IDS)
    Oluwadamilare Harazeem Abdulganiyu
    Taha Ait Tchakoucht
    Yakub Kayode Saheed
    International Journal of Information Security, 2023, 22 : 1125 - 1162
  • [25] A systematic literature review for network intrusion detection system (IDS)
    Abdulganiyu, Oluwadamilare Harazeem
    Tchakoucht, Taha Ait
    Saheed, Yakub Kayode
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1125 - 1162
  • [26] Dimensionality Reduction and Visualization of Network Intrusion Detection Data
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 441 - 455
  • [27] Neural visualization of network traffic data for intrusion detection
    Corchado, Emilio
    Herrero, Alvaro
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 2042 - 2056
  • [28] Intrusion Detection System: Classification and Techniques
    Soniya, S. Sobin
    Vigila, S. Maria Celestin
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [29] Information fusion techniques for network intrusion detection
    Ye, N
    Giordano, J
    Feldman, J
    Zhong, Q
    1998 IEEE INFORMATION TECHNOLOGY CONFERENCE, PROCEEDINGS, 1998, : 117 - 120
  • [30] Evaluating clustering techniques for network intrusion detection
    Zhong, S
    Khoshgoftaar, T
    Seliya, N
    TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2004, : 173 - 177