The Parallel Coordinates Methodology to Study Suspicious Behavior on a Computer Network
รหัสดีโอไอ
Creator ณัฐโชติ พรหมฤทธิ
Title The Parallel Coordinates Methodology to Study Suspicious Behavior on a Computer Network
Contributor อนิราช มิ่งขวัญ
Publisher Faculty of Information Science and Technology, Mahanakorn University of Technology
Publication Year 2554
Journal Title Journal of Information Science and Technology
Journal Vol. 2
Journal No. 1
Page no. 12-20
Keyword Network forensic, Network traffic, Network traffic visualization, Parallel coordinates
URL Website https://tci-thaijo.org/index.php/JIST
Website title Journal of Information Science and Technology
ISSN 2651-1053
Abstract In this paper, the suspicious behavior on a computer network is used to analyze by detecting the violation behavior of network security policies. This paper proposed the user investigations with visualization time machine for network forensic (UIV) model. The proposed model is used parallel coordinates, which can be presented as the relationship of various parameters such as user, source ip address, time, destination ip address, destination service and domain name. For this system, the model is tested by simulated attack. The result of experiment shows that (i) the attacked signatures are different depended on situation attacked and (ii) the analyst are able to tracking individual behavior using UIV model.
คณะวิทยาการและเทคโนโลยีสารสนเทศ มหาวิทยาลัยเทคโนโลยีมหานคร

บรรณานุกรม

EndNote

APA

Chicago

MLA

ดิจิตอลไฟล์

Digital File
DOI Smart-Search
สวัสดีค่ะ ยินดีให้บริการสอบถาม และสืบค้นข้อมูลตัวระบุวัตถุดิจิทัล (ดีโอไอ) สำนักการวิจัยแห่งชาติ (วช.) ค่ะ