Atypical behavior identification in large-scale network traffic

Cyber analysts are faced with the daunting challenge of identifying exploits and threats within potentially billions of daily records of network traffic. Enterprise-wide cyber traffic involves hundreds of millions of distinct IP addresses and results in data sets ranging from terabytes to petabytes...

Full description

Saved in:
Bibliographic Details
Published in:2011 IEEE Symposium on Large Data Analysis and Visualization pp. 15 - 22
Main Authors: Best, D. M., Hafen, R. P., Olsen, B. K., Pike, W. A.
Format: Conference Proceeding
Language:English
Published: IEEE 01.10.2011
Subjects:
ISBN:9781467301565, 1467301566
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first