By Topic

Case Study: Visualization Methodology for Analysing Network Data

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ten, D.W.H. ; Nat. Adv. IPv6 Centre (NAv6), Univ. Sains Malaysia, Minden, Malaysia ; Ramadass, S.

Existing monitoring methods have been used for network traffic and network malicious such as using a network monitoring system or network intrusion system. These systems mainly focus to capture traffic and anomaly data. After the capturing process, the data is visualized without doing any analysis on these captured network data. Besides, there are a number of tools with visualization techniques (e.g. Scatterplot, bar graph) that can be applied in the network monitoring system. The one-dimensional (1D), two-dimensional (2D), three-dimensional (3D) and high multidimensional data can be presented by using relevant visualization techniques. Most of the visualization techniques exist in generating the captured network data into informative graphical 2D or 3D view. However, there are no tools or systems that are able to identify as well as analyses the types of given network data and presents it into the robust and meaningful illustration based on user requirements. This paper explored a new algorithm that would be used to solve the constraints which have been mentioned above. We also presented how the algorithm can facilitate the current visualization methodology. By the end of this, our proposed methodology should be able to analyse different types of network data automatically and effectively.

Published in:

Computer Modelling and Simulation (UKSim), 2010 12th International Conference on

Date of Conference:

24-26 March 2010