Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 24))

  • 571 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

2. Further Reading

  1. D Anderson, T Frivold, and A Valdes. Next-generation intrusion-detection expert system (NIDES). Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, USA, May 1995. 51, 131

    Google Scholar 

  2. Carla Brodley, Philip Chan, Richard Lippman, and Bill Yurcik, editors. VizSEC/DMSEC’ 04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, Washington DC, USA, 2004. ACM Press. 131

    Google Scholar 

  3. Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke. Intrusion and Misuse Detection in Large-Scale Systems. Computer Graphics and Applications, 22(1):38–48, January 2002. 130

    Article  Google Scholar 

  4. Deborah A. Frincke, Donald L. Tobin, and Jesse C. McConnell. Research Issues in Cooperative Intrusion Detection Between Multiple Domains. In Proceedings of Recent advances in intrusion detetection RAID’98, 1998. 130

    Google Scholar 

  5. Luc Girardin and Dominique Brodbeck. A visual approach for monitoring logs. In The Proceedings of the 12th Systems Administration Conference (LISA’ 98), pages 299–308, Boston, Massachusetts, USA, 6–11 December 1998. The USENIX Association. 130

    Google Scholar 

  6. Luc Girardin. An eye on network intruder-administrator shootouts. In The Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, 9–12 April 1999. The USENIX Association. 130

    Google Scholar 

  7. Chaivat Jirapummin, Naruemon Wattanapongsakorn, and Prasert Kanthamanon. Hybrid neural networks for intrusion detection system. In Proceedings of The 2002 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2002), pages 928–931, Phuket, Thailand, 16–19 July 2002. 130

    Google Scholar 

  8. Teuvo Kohonen. Self-Organizing Maps, volume 30 of Springer Series in Information Sciences. Springer Verlag, Third edition, 2001. ISBN 3-540-67921-9, ISSN 0720-678X. 130

    Google Scholar 

  9. P. Lichodzijewski, A.N. Zincir-Heywood, and Heywood M.I. Host-based intrusion detection using self-organizing maps. In The proceedings of the IEEE International Joint Conference on Neural Networks. IEEE, May 2002. 130

    Google Scholar 

  10. Manikantan Ramadas, Shawn Ostermann, and Brett Tjaden. Detecting anomalous network traffic with self-organizing maps. In Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection, LNCS, Pittsburgh, PA, USA, 8–10 September 2003. Springer Verlag. 130

    Google Scholar 

  11. Soon Tee Teoh, Kwan-Liu Ma, S. Felix Wu, and Xiaoliang Zhao. Case Study: Interactive Visualization for Internet Security. In Proceedings of IEEE Visualization 2002, The Boston Park Plaza hotel, Boston, Massachusetts, USA, 27 October to 1 November 2002. IEEE Computer society. 130

    Google Scholar 

  12. Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, and S. Felix Wu. Combining visual and automated data mining for near-real-time anomaly detection and analysis in bgp. In VizSEC/DMSEC’ 04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 35–44, Washington DC, USA, 2004. ACM Press. 131

    Google Scholar 

  13. Greg Vert, Deborah A. Frincke, and Jesse C. McConnell. A Visual Mathematical Model for Intrusion Detection. In Proceedings of the 21st National Information Systems Security Conference, Crystal City, Arlington, VA, USA, 5-8 October 1998. NIST, National Institute of Standards and Technology/National Computer Security Center. 130

    Google Scholar 

  14. Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, and Kiran Lakkaraju. Visflowconnect: netflow visualizations of link relationships for security situational awareness. In VizSEC/DMSEC’ 04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 26–34, Washington DC, USA, 2004. ACM Press. 131

    Google Scholar 

  15. John Zachary, John McEachen, and Dan Ettlich. Conversation exchange dynamics for real-time network monitoring and anomaly detection. In IWIA’ 04: Proceedings of the Second IEEE International Information Assurance Workshop (IWIA’04), page 59. IEEE Computer Society, 2004. 131

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

(2006). Epilogue. In: Understanding Intrusion Detection Through Visualization. Advances in Information Security, vol 24. Springer, Boston, MA. https://doi.org/10.1007/0-387-27636-X_8

Download citation

  • DOI: https://doi.org/10.1007/0-387-27636-X_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-27634-2

  • Online ISBN: 978-0-387-27636-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics