Visualization system by combinatorial use of Edge Bundling and Treemap for network traffic data analysis

Ryo Takayanagi, Yoshihiro Okada

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the spread of the Internet, the increase of damage caused by malware has become a worldwide problem. Malicious persons attack computer systems by focusing on their some vulnerabilities called security holes in order to install malware. Especially, a zero-day attack is a serious problem that tries to attack through a certain security hole before the treatment against it. So, the visualization of network traffic is very important in order to find out such attacks. In this paper, the authors propose a visualization system called PacketVisualization of darknet data using Treemap layout algorithm and its extended version using Edge Bundling for analysis of such attacks and shows some visualization examples.

Original languageEnglish
Title of host publicationInformation Search, Integration, and Personalization - 10th International Workshop, ISIP 2015, Revised Selected Papers
EditorsYuzuru Tanaka, Emanuel Grant, Dimitris Kotzinos, Dominique Laurent, Nicolas Spyratos
PublisherSpringer Verlag
Pages128-141
Number of pages14
ISBN (Print)9783319438610
DOIs
Publication statusPublished - Jan 1 2016
Event10th International Workshop on Information Search, Integration, and Personalization, ISIP 2015 - Grand Forks, United States
Duration: Oct 1 2015Oct 2 2015

Publication series

NameCommunications in Computer and Information Science
Volume622
ISSN (Print)1865-0929

Other

Other10th International Workshop on Information Search, Integration, and Personalization, ISIP 2015
Country/TerritoryUnited States
CityGrand Forks
Period10/1/1510/2/15

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Fingerprint

Dive into the research topics of 'Visualization system by combinatorial use of Edge Bundling and Treemap for network traffic data analysis'. Together they form a unique fingerprint.

Cite this