Practical firewall policy inspection using anomaly detection and its visualization
暂无分享,去创建一个
[1] Eduard Glatz,et al. Visualizing host traffic through graphs , 2010, VizSec '10.
[2] Raffael Marty,et al. Applied Security Visualization , 2008 .
[3] Ehab Al-Shaer,et al. PolicyVis: Firewall Security Policy Visualization and Inspection , 2007, LISA.
[4] Raheem A. Beyah,et al. Visual firewall: real-time network security monitor , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[5] William Yurcik,et al. The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[6] E. Al-Shaer,et al. Firewall Policy Advisor for anomaly discovery and rule editing , 2003, IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003..
[7] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[8] Penny Rheingans,et al. Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective , 2007, VizSEC.
[9] John R. Goodall,et al. Introduction to Visualization for Computer Security , 2007, VizSEC.
[10] Nidhi Sharma,et al. FireViz: A Personal Firewall Visualizing Tool , 2005 .
[11] Emden R. Gansner,et al. Graphviz and Dynagraph – Static and Dynamic Graph Drawing Tools , 2003 .
[12] E. Al-Shaer,et al. Design and Implementation of Firewall Policy Advisor Tools , 2004 .
[13] William Cheswick,et al. Firewalls and Internet Security , 1994 .