dc.contributor.author | Ξύδας, Ιωάννης | el |
dc.contributor.author | Μιαούλης, Γεώργιος | el |
dc.contributor.author | Bonnefoi, Pierre-François | el |
dc.contributor.author | Πλεμμένος, Δημήτρης | el |
dc.contributor.author | Ghazanfarpour, Djamchid | en |
dc.date.accessioned | 2015-05-07T16:50:07Z | |
dc.date.available | 2015-05-07T16:50:07Z | |
dc.date.issued | 2015-05-07 | |
dc.identifier.uri | http://hdl.handle.net/11400/9837 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://users.teiath.gr/yxydas/Paper1_xydas.pdf | el |
dc.source | http://www.siggraph.org/ | en |
dc.subject | Visualization | |
dc.subject | Information security | |
dc.subject | Intrusion detection | |
dc.subject | Web attacks | |
dc.subject | Expert systems (Computer science) | |
dc.subject | Neural networks | |
dc.subject | Anomaly detection (Computer security) | |
dc.subject | Network security | |
dc.subject | Surveillance aid | |
dc.subject | Οπτικοποίηση δεδομένων | |
dc.subject | Ασφάλεια πληροφοριών | |
dc.subject | Ανίχνευση εισβολής | |
dc.subject | Διαδικτυακές επιθέσεις | |
dc.subject | Έμπειρα συστήματα | |
dc.subject | Νευρωνικά δίκτυα | |
dc.subject | Εντοπισμός ανωμαλιών | |
dc.subject | Ασφάλεια δικτύου | |
dc.subject | Ενίσχυση επιτήρησης | |
dc.title | 3D graph visualization prototype system for intrusion detection | en |
heal.type | conferenceItem | |
heal.secondaryTitle | a surveillance aid to security analysts | en |
heal.classification | Technology | |
heal.classification | Computer science | |
heal.classification | Τεχνολογία | |
heal.classification | Πληροφορική | |
heal.classificationURI | http://zbw.eu/stw/descriptor/10470-6 | |
heal.classificationURI | http://skos.um.es/unescothes/C00750 | |
heal.classificationURI | **N/A**-Τεχνολογία | |
heal.classificationURI | **N/A**-Πληροφορική | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh85046450 | |
heal.keywordURI | http://zbw.eu/stw/descriptor/19808-6 | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh2005007675 | |
heal.identifier.secondary | ISBN: 2-9142256-08-6 | |
heal.language | en | |
heal.access | free | |
heal.recordProvider | Σχολή Τεχνολογικών Εφαρμογών. Τμήμα Μηχανικών Πληροφορικής Τ.Ε. | el |
heal.publicationDate | 2006-05 | |
heal.bibliographicCitation | Xydas, I., Miaoulis, G., Bonnefoi, P.F., Plemenos, D.and Ghazanfarpour, D. (2006) 3D graph visualization prototype system for intrusion detection: a surveillance aid to security analysts. In "9th International Conference on Computer Graphics and Artificial Intelligence". Limoges: [Eurogrpahics & ACM and SIGGRAPH]. Available from: http://users.teiath.gr/yxydas/Paper1_xydas.pdf [Accessed: 07/05/2015]. | en |
heal.abstract | Intrusion Detection (ID) and Intrusion Prevention (IP) systems are an indispensable part of the information security infrastructure of every networking company or organization. Intrusion Detections Systems (IDS) have problems, such as false positives, operational issues in high-speed environments and the difficulty of detecting unknown threats. Intrusion Prevention Systems (IPS) are still in their infancy. There is a misconception in the market that intrusion detection and intrusion prevention are basically the same technology or that IDS systems are on the way out and IPS and firewalls are the wave of the future. In fact, IDS are far from becoming obsolete and both systems complement each other. Much of ID research has focused on improving the accuracy and operation of IDSs but surprisingly there has been very little research into supporting the security analysts’ intrusion detection tasks. In this paper we will describe an ongoing surveillance prototype system which offers a visual aid to the security analyst by monitoring and exploring 3D graphs. The system offers a visual surveillance of the network activity on a web server for both normal and anomalous or malicious activity. Colors are used on the 3D graphics to indicate different categories of web attacks and the analyst has the ability to navigate into the web requests, of either normal or malicious traffic. | en |
heal.publisher | Eurogrpahics | en |
heal.publisher | ACM and SIGGRAPH | en |
heal.fullTextAvailability | false | |
heal.conferenceName | 9th International Conference on Computer Graphics and Artificial Intelligence | en |
heal.conferenceItemType | full paper |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: