Visual analytics for network flow analysis

John R. Goodall, Daniel R. Tesone

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming - a billion flow records a day for large organizations is not abnormal. We have integrated our visual analytics toolkit with network flow data to provide a seamless workflow for computer network defense analysts. This integration can facilitate the learning process of novice analysts and make expert analysts more productive.

Original languageEnglish
Title of host publicationProceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009
Pages199-204
Number of pages6
DOIs
StatePublished - 2009
Externally publishedYes
EventCybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009 - Washington, DC, United States
Duration: Mar 3 2009Mar 4 2009

Publication series

NameProceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009

Conference

ConferenceCybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009
Country/TerritoryUnited States
CityWashington, DC
Period03/3/0903/4/09

Fingerprint

Dive into the research topics of 'Visual analytics for network flow analysis'. Together they form a unique fingerprint.

Cite this