Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
2. Further Reading
D Anderson, T Frivold, and A Valdes. Next-generation intrusion-detection expert system (NIDES). Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, USA, May 1995. 51, 131
Carla Brodley, Philip Chan, Richard Lippman, and Bill Yurcik, editors. VizSEC/DMSEC’ 04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, Washington DC, USA, 2004. ACM Press. 131
Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke. Intrusion and Misuse Detection in Large-Scale Systems. Computer Graphics and Applications, 22(1):38–48, January 2002. 130
Deborah A. Frincke, Donald L. Tobin, and Jesse C. McConnell. Research Issues in Cooperative Intrusion Detection Between Multiple Domains. In Proceedings of Recent advances in intrusion detetection RAID’98, 1998. 130
Luc Girardin and Dominique Brodbeck. A visual approach for monitoring logs. In The Proceedings of the 12th Systems Administration Conference (LISA’ 98), pages 299–308, Boston, Massachusetts, USA, 6–11 December 1998. The USENIX Association. 130
Luc Girardin. An eye on network intruder-administrator shootouts. In The Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, 9–12 April 1999. The USENIX Association. 130
Chaivat Jirapummin, Naruemon Wattanapongsakorn, and Prasert Kanthamanon. Hybrid neural networks for intrusion detection system. In Proceedings of The 2002 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2002), pages 928–931, Phuket, Thailand, 16–19 July 2002. 130
Teuvo Kohonen. Self-Organizing Maps, volume 30 of Springer Series in Information Sciences. Springer Verlag, Third edition, 2001. ISBN 3-540-67921-9, ISSN 0720-678X. 130
P. Lichodzijewski, A.N. Zincir-Heywood, and Heywood M.I. Host-based intrusion detection using self-organizing maps. In The proceedings of the IEEE International Joint Conference on Neural Networks. IEEE, May 2002. 130
Manikantan Ramadas, Shawn Ostermann, and Brett Tjaden. Detecting anomalous network traffic with self-organizing maps. In Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection, LNCS, Pittsburgh, PA, USA, 8–10 September 2003. Springer Verlag. 130
Soon Tee Teoh, Kwan-Liu Ma, S. Felix Wu, and Xiaoliang Zhao. Case Study: Interactive Visualization for Internet Security. In Proceedings of IEEE Visualization 2002, The Boston Park Plaza hotel, Boston, Massachusetts, USA, 27 October to 1 November 2002. IEEE Computer society. 130
Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, and S. Felix Wu. Combining visual and automated data mining for near-real-time anomaly detection and analysis in bgp. In VizSEC/DMSEC’ 04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 35–44, Washington DC, USA, 2004. ACM Press. 131
Greg Vert, Deborah A. Frincke, and Jesse C. McConnell. A Visual Mathematical Model for Intrusion Detection. In Proceedings of the 21st National Information Systems Security Conference, Crystal City, Arlington, VA, USA, 5-8 October 1998. NIST, National Institute of Standards and Technology/National Computer Security Center. 130
Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, and Kiran Lakkaraju. Visflowconnect: netflow visualizations of link relationships for security situational awareness. In VizSEC/DMSEC’ 04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 26–34, Washington DC, USA, 2004. ACM Press. 131
John Zachary, John McEachen, and Dan Ettlich. Conversation exchange dynamics for real-time network monitoring and anomaly detection. In IWIA’ 04: Proceedings of the Second IEEE International Information Assurance Workshop (IWIA’04), page 59. IEEE Computer Society, 2004. 131
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2006). Epilogue. In: Understanding Intrusion Detection Through Visualization. Advances in Information Security, vol 24. Springer, Boston, MA. https://doi.org/10.1007/0-387-27636-X_8
Download citation
DOI: https://doi.org/10.1007/0-387-27636-X_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-27634-2
Online ISBN: 978-0-387-27636-6
eBook Packages: Computer ScienceComputer Science (R0)