Paper
3 May 2001 Visual behavior characterization for intrusion and misuse detection
Robert F. Erbacher, Deborah Frincke
Author Affiliations +
Proceedings Volume 4302, Visual Data Exploration and Analysis VIII; (2001) https://doi.org/10.1117/12.424930
Event: Photonics West 2001 - Electronic Imaging, 2001, San Jose, CA, United States
Abstract
As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Robert F. Erbacher and Deborah Frincke "Visual behavior characterization for intrusion and misuse detection", Proc. SPIE 4302, Visual Data Exploration and Analysis VIII, (3 May 2001); https://doi.org/10.1117/12.424930
Lens.org Logo
CITATIONS
Cited by 14 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Visualization

Computer networks

Network security

Data mining

Visual analytics

Computing systems

Computer intrusion detection

Back to Top