首页 | 本学科首页   官方微博 | 高级检索  
     


Detecting flaws and intruders with visual data analysis
Authors:Soon Tee Teoh Kwan-Liu Ma Wu  SF Jankun-Kelly  TJ
Affiliation:California Univ., Davis, CA, USA;
Abstract:The task of sifting through large amounts of data to find useful information spawned the field of data mining. Most data mining approaches are based on machine-learning techniques, numerical analysis, or statistical modeling. They use human interaction and visualization only minimally. Such automatic methods can miss some important features of the data. Incorporating human perception into the data mining process through interactive visualization can help us better understand the complex behaviors of computer network systems. This article describes visual-analytics-based solutions and outlines a visual exploration process for log analysis. Three log-file analysis applications demonstrate our approach's effectiveness in discovering flaws and intruders in network systems.
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号