Graphics Reference
In-Depth Information
of the targeted computers of the registry reads attacks has been highlighted
in bright red, as can be seen in the third column of the parallel coordinate
plot, as well as the ninth item in the far-right bar chart. Visual inspection
shows that this particular target computer is attacked from two different
source computers (second column) and that these events occur at regular
intervals over time (fifth column and also the timeline chart below). With
this extra insight, combining link analysis with other variables, the security
specialistmaybeabletoreachaconclusion—forexample,thisisanexpected
regular event, and this is not an attack.
Parallel coordinate plot and linked-chart multi-variate analysis isn't the
target of this topic. However, it is a highly recommended data exploration
and analysis technique that can be effective for analyzing some types of
graphs.
Note
The graph in Figure 4-26 was created with Mondrian
( http://www.rosuda.org/Mondrian ) .
Search WWH ::




Custom Search