Visualization of abnormal behavior detection using parallel coordinate and correspondence analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cho, J. | - |
dc.contributor.author | Choi, K. | - |
dc.contributor.author | Shon, T. | - |
dc.contributor.author | Moon, J. | - |
dc.date.accessioned | 2021-09-06T09:53:41Z | - |
dc.date.available | 2021-09-06T09:53:41Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2013 | - |
dc.identifier.issn | 1343-4500 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/105938 | - |
dc.description.abstract | Most of the network management part, especially a network security needs effective visualization methods for flooding connections. Because many web systems using huge users are suffering from huge normal connections with flooding attacks. Also, most of the connection cases have to be monitored for intrusion detection including any kinds of abnormal connection cases. Therefore, in this paper we propose an effective visualization method with a classification method for classifying between normal and abnormal flooding network status. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | International Information Institute Ltd. | - |
dc.title | Visualization of abnormal behavior detection using parallel coordinate and correspondence analysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Moon, J. | - |
dc.identifier.scopusid | 2-s2.0-84877303799 | - |
dc.identifier.bibliographicCitation | Information (Japan), v.16, no.3 A, pp.1847 - 1859 | - |
dc.relation.isPartOf | Information (Japan) | - |
dc.citation.title | Information (Japan) | - |
dc.citation.volume | 16 | - |
dc.citation.number | 3 A | - |
dc.citation.startPage | 1847 | - |
dc.citation.endPage | 1859 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Categorical data classification | - |
dc.subject.keywordAuthor | Intrusion detection | - |
dc.subject.keywordAuthor | Intrusion visualization | - |
dc.subject.keywordAuthor | Network monitoring | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.