Descripteur
Documents disponibles dans cette catégorie (2)
Ajouter le résultat dans votre panier
Visionner les documents numériques
Affiner la recherche Interroger des sources externes
Etendre la recherche sur niveau(x) vers le bas
Securing geospatial information / A. Matheus in GEO: Geoconnexion international, vol 9 n° 9 (october 2010)
[article]
Titre : Securing geospatial information Type de document : Article/Communication Auteurs : A. Matheus, Auteur ; C. Higgins, Auteur ; Steven Ramage, Auteur Année de publication : 2010 Article en page(s) : pp 40 - 43 Note générale : Bibliographie Langues : Anglais (eng) Descripteur : [Vedettes matières IGN] Infrastructure de données
[Termes IGN] infrastructure nationale des données localisées
[Termes IGN] interopérabilité
[Termes IGN] norme d'échange de données localisées
[Termes IGN] sécurité informatique
[Termes IGN] surveillance informatiqueRésumé : (Editeur) Geospatial content and service providers frequently need to control who is accessing their content. Such control may be necessary to ensure profits, or to respect agreements with other providers in the value chain, or to respect privacy rights, or to reduce risks to information, lives, real property or national security, or perhaps for other reasons. This article looks at the role of standards in securing geospatial information. Numéro de notice : A2010-392 Affiliation des auteurs : non IGN Thématique : GEOMATIQUE Nature : Article DOI : sans Permalink : https://documentation.ensg.eu/index.php?lvl=notice_display&id=30585
in GEO: Geoconnexion international > vol 9 n° 9 (october 2010) . - pp 40 - 43[article]Exemplaires(1)
Code-barres Cote Support Localisation Section Disponibilité 062-2010091 SL Revue Centre de documentation Revues en salle Disponible Visual analysis of network traffic – interactive monitoring, detection, and interpretation of security threats / Florian Mansmann (ca 2008)
Titre : Visual analysis of network traffic – interactive monitoring, detection, and interpretation of security threats Type de document : Thèse/HDR Auteurs : Florian Mansmann, Auteur Editeur : Konstanz : University of Konstanz Année de publication : ca 2008 Importance : 186 p. Format : 21 x 30 cm Note générale : bibliographie
Dissertation zur Erlangung des akademischen Grades des Doktors der Naturwissenschaften an der Universität Konstanz im Fachbereich Informatik und InformationswissenschaftLangues : Français (fre) Descripteur : [Vedettes matières IGN] Informatique
[Termes IGN] analyse multivariée
[Termes IGN] analyse visuelle
[Termes IGN] carte de Kohonen
[Termes IGN] classification par réseau neuronal
[Termes IGN] géovisualisation
[Termes IGN] graphe
[Termes IGN] internet
[Termes IGN] sécurité informatique
[Termes IGN] surveillance informatiqueRésumé : (auteur) The Internet has become a dangerous place: malicious code gets spread on personal computers across the world, creating botnets ready to attack the network infrastructure at any time. Monitoring network traffic and keeping track of the vast number of security incidents or other anomalies in the network are challenging tasks. While monitoring and intrusion detection systems are widely used to collect operational data in real-time, attempts to manually analyze their output at a fine-granular level are often tedious, require exhaustive human resources, or completely fail to provide the necessary insight due to the complexity and the volume of the underlying data. This dissertation represents an effort to complement automatic monitoring and intrusion detection systems with visual exploration interfaces that empower human analysts to gain deeper insight into large, complex, and dynamically changing data sets. In this context, one key aspect of visual analysis is the refinement of existing visualization methods to improve their scalability with respect to a) data volume, b) visual limitations of computer screens, and c) human perception capacities. In addition to that, developmet of innovative visualization metaphors for viewing network data is a further key aspect of this thesis. In particular, this dissertation deals with scalable visualization techniques for detailed analysis of large network time series. By grouping time series according to their logical intervals in pixel visualizations and by coloring them for better discrimination, our methods enable accurate comparisons of temporal aspects in network security data sets. In order to reveal the peculiarities of network traffic and distributed attacks with regard to the distribution of the participating hosts, a hierarchical map of the IP address space, which takes both geographical and topological aspects of the Internet into account, is proposed. Since visual clutter becomes an issue when naively connecting the major communication partners on top of this map, hierarchical edge bundles are used for grouping traffic links based on the map’s hierarchy, thereby facilitating a more scalable analysis of communication partners. Furthermore, the map is complemented by multivariate analysis techniques for visually studying the multidimensional nature of network traffic and security event data. Especially the interaction of the implemented prototypes reveals the ability of the proposed visualization methods to provide an overview, to relate communication partners, to zoom into regions of interest, and to retrieve detailed information. For an even more detailed analysis of hosts in the network, we introduce a graph-based approach to tracking behavioral changes of hosts and higher-level network entities. This information is particularly useful for detecting misbehaving computers within the local network infrastructure, which can otherwise substantially compromise the security of the network. To complete the comprehensive view on network traffic, a Self-Organizing Map was used to demonstrate the usefulness of visualization methods for analyzing not only structured network protocol data, but also unstructured information, e.g., textual context of email messages. By extracting features from the emails, the neuronal network algorithm clusters similar emails and is capable of distinguishing between spam and legitimate emails up to a certain extent. In the scope of this dissertation, the presented prototypes demonstrate the applicability of the proposed visualization methods in numerous case studies and reveal the exhaustless potential of their usage in combination with automatic detection methods. We are therefore confident that in the fields of network monitoring and security visual analytics applications will quickly find their way from research into practice by combining human background knowledge and intelligence with the speed and accuracy of computers. Numéro de notice : 17246 Affiliation des auteurs : non IGN Thématique : INFORMATIQUE Nature : Thèse étrangère Note de thèse : Dissertation : Informatique : Constance : 2008 Permalink : https://documentation.ensg.eu/index.php?lvl=notice_display&id=81637