By Topic

Expert-Aware Approach Towards Network Security Visualization Tool Services

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Wong, D.H.-T. ; Nat. Adv. IPv6 Centre (NAv6), Univ. Sains Malaysia, Minden, Malaysia ; Kok-Soon Chai ; Ramadass, S. ; Vavasseur, N.

Many computers have been infected with the computer anomalies. The availability of network security visualization tools greatly facilitate to perceive computer users from being affected by these anomalies. Many of the network security visualization tools are designed particularly for users with advanced network security knowledge even though the tools are indispensable by various types of computer users. We proposed an expert-aware approach to designing a system which formulated with a large amount of network data or high-dimensional data and adaptive for different types of users. In the preliminary phase, we construct an expertise classification algorithm which provides a default setting for the expert-aware network security visualization tool. The tool will learn from continual user feedbacks in order to statistically satisfy the needs of majority tool users. The expert-aware approach looks at the users' expertise level in network security and adapts the visualization views that are best suitable for the user. Initial results of the implementation of the system show that it is capable of representing several of network security data not only from small network but also complicated high dimensional network. Our main focus in this paper is to fulfill different requirements from different computer users.

Published in:

Network Applications Protocols and Services (NETAPPS), 2010 Second International Conference on

Date of Conference:

22-23 Sept. 2010