Log Visualization to track Compromised Host on the Network

dc.contributor.authorGoyal, Sheenam
dc.contributor.supervisorSingh, Maninder
dc.date.accessioned2009-08-12T06:24:58Z
dc.date.available2009-08-12T06:24:58Z
dc.date.issued2009-08-12T06:24:58Z
dc.description.abstractOrganizations are facing the problem to look at complex data sets and understand various data entries. Visualization techniques aid administrator in recognizing attacks, instead of reading line by line, visualize the data with graphs using various tools. The goal of log visualization to provide a new way of seeing the data.en
dc.format.extent2360927 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10266/864
dc.subjectNetwork Securityen
dc.subjectLog Visualizationen
dc.titleLog Visualization to track Compromised Host on the Networken
dc.typeME- Software Engineeringen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
864 Sheenam Goyal (80731022).pdf
Size:
2.25 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Item-specific license agreed upon to submission
Description: