The Library
SOM-based techniques towards hierarchical visualisation of network forensics traffic data
Tools
Palomo, E. J., Elizondo, D., Domínguez, E., Luque, R. M. and Watson, Tim (2012) SOM-based techniques towards hierarchical visualisation of network forensics traffic data. In: Computational Intelligence for Privacy and Security. Springer, pp. 75-95. ISBN 9783642252365
Research output not available from this repository.
Request-a-Copy directly from author or use local Library Get it For Me service.
Official URL: http://dx.doi.org/10.1007/978-3-642-25237-2_6
Abstract
Current research is improving the quality and efficiency of digital investigation methods due to the continuous proliferation of digital crimes. This includes the use of software tools that can help with digital investigations. A novel method for the analysis and visualisation of network forensics traffic data, based on growing hierarchical self-organising maps (GHSOM), is presented. Self-organising maps have shown to be successful for the analysis of highly-dimensional input data in data mining applications as well as for data visualisation. Moreover, the hierarchical architecture of the GHSOM is more flexible than a single SOM in the adaptation process to input data, capturing inherent hierarchical relationships among them. To evaluate the performance of this method in the field of network forensics, traffic data has been clustered and visualised in a hierarchical fashion to enhance the ability of digital forensics to find evidence of attacks or anomalous behaviour in the network. Experimental results show the utility of this approach.
Item Type: | Book Item | ||||
---|---|---|---|---|---|
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||
Publisher: | Springer | ||||
ISBN: | 9783642252365 | ||||
ISSN: | 1860-949X | ||||
Book Title: | Computational Intelligence for Privacy and Security | ||||
Official Date: | 2012 | ||||
Dates: |
|
||||
Volume: | 394 | ||||
Page Range: | pp. 75-95 | ||||
DOI: | 10.1007/978-3-642-25237-2_6 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |