Practical firewall policy inspection using anomaly detection and its visualization

[1]  Eduard Glatz,et al.  Visualizing host traffic through graphs , 2010, VizSec '10.

[2]  Raffael Marty,et al.  Applied Security Visualization , 2008 .

[3]  Ehab Al-Shaer,et al.  PolicyVis: Firewall Security Policy Visualization and Inspection , 2007, LISA.

[4]  Raheem A. Beyah,et al.  Visual firewall: real-time network security monitor , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..

[5]  William Yurcik,et al.  The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[6]  E. Al-Shaer,et al.  Firewall Policy Advisor for anomaly discovery and rule editing , 2003, IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003..

[7]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[8]  Penny Rheingans,et al.  Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective , 2007, VizSEC.

[9]  John R. Goodall,et al.  Introduction to Visualization for Computer Security , 2007, VizSEC.

[10]  Nidhi Sharma,et al.  FireViz: A Personal Firewall Visualizing Tool , 2005 .

[11]  Emden R. Gansner,et al.  Graphviz and Dynagraph – Static and Dynamic Graph Drawing Tools , 2003 .

[12]  E. Al-Shaer,et al.  Design and Implementation of Firewall Policy Advisor Tools , 2004 .

[13]  William Cheswick,et al.  Firewalls and Internet Security , 1994 .