Visualizing network traffic for intrusion detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Intrusion detection, the process of using network data to identify potential attacks, has become an essential component of information security. Human analysts doing intrusion detection work utilize vast amounts of data from disparate sources to make decisions about potential attacks. Yet, there is limited understanding of this critical human component. This research seeks to understand the work practices of these human analysts to inform the design of a task-appropriate information visualization tool to support network intrusion detection analysis tasks. System design will follow a user-centered, spiral methodology. System evaluation will include both a field-based qualitative evaluation, uncommon in information visualization, and a lab-based benchmarking evaluation.

Original languageEnglish
Title of host publicationProceedings of the Conference on Designing Interactive Systems, DIS2006
PublisherAssociation for Computing Machinery (ACM)
Pages363-364
Number of pages2
ISBN (Print)1595933417, 9781595933416
DOIs
StatePublished - 2006
EventProceedings of the Conference on Designing Interactive Systems, DIS2006 - University Park, PA, United States
Duration: Jun 26 2006Jun 28 2006

Publication series

NameProceedings of the Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS
Volume2006

Conference

ConferenceProceedings of the Conference on Designing Interactive Systems, DIS2006
Country/TerritoryUnited States
CityUniversity Park, PA
Period06/26/0606/28/06

Keywords

  • HCI
  • Information visualization
  • Intrusion detection
  • Network security

Fingerprint

Dive into the research topics of 'Visualizing network traffic for intrusion detection'. Together they form a unique fingerprint.

Cite this