Intrusion behavior detection through visualization

@inproceedings{Erbacher2003IntrusionBD,
  title={Intrusion behavior detection through visualization},
  author={Robert F. Erbacher},
  booktitle={SMC},
  year={2003}
}
As computer and network intrusions become more and more of a concern, the need for better capabilities to assist in the detection and analysis of intrusions also increases. We propose a methodology for analyzing network and computer log information visually based on the analysis of user behavior. Each user’s behavior is the key to determining their intent and overriding goals, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate goal, which… CONTINUE READING
Highly Cited
This paper has 35 citations. REVIEW CITATIONS