I. El-Henawy, Alaa El, Din Riad, Ahmed M. Hassan, N. Awadallah
{"title":"VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION - A SURVEY","authors":"I. El-Henawy, Alaa El, Din Riad, Ahmed M. Hassan, N. Awadallah","doi":"10.5121/IJCSES.2011.2308","DOIUrl":null,"url":null,"abstract":"In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the task of detecting intrusions is becoming an increasingly difficult. Efficient information visualization is an important element required for urgent detection of intruders. This paper presents a survey on using visualization techniques in intrusion detection system. Finally authors proposed a framework for visualization system for ID.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Science & Engineering Survey","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/IJCSES.2011.2308","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the task of detecting intrusions is becoming an increasingly difficult. Efficient information visualization is an important element required for urgent detection of intruders. This paper presents a survey on using visualization techniques in intrusion detection system. Finally authors proposed a framework for visualization system for ID.