{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T03:17:37Z","timestamp":1777778257123,"version":"3.51.4"},"reference-count":27,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2003,6,1]],"date-time":"2003-06-01T00:00:00Z","timestamp":1054425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Visualization"],"published-print":{"date-parts":[[2003,6]]},"abstract":"<jats:p>The rapid growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited, in part, by their inability to relay effectively relevant information due to their lack of interactive\/immersive technologies. In this paper, we explore several network visualization techniques geared toward intrusion detection on small- and large-scale networks. We also examine the use of haptics in network intrusion visualization. By incorporating concepts from electromagnetics, fluid dynamics, and gravitational theory, we show that haptic technologies can provide another dimension of information critical to the efficient visualization of network intrusion data. Furthermore, we explore the applicability of these visualization techniques in conjunction with commercial network intrusion detectors. Finally, we present a network intrusion visualization application with haptic integration, NIVA, which allows the analyst to interactively investigate as well as efficiently detect structured attacks across time and space using advanced interactive three-dimensional displays.<\/jats:p>","DOI":"10.1057\/palgrave.ivs.9500044","type":"journal-article","created":{"date-parts":[[2003,8,29]],"date-time":"2003-08-29T11:29:30Z","timestamp":1062156570000},"page":"82-94","source":"Crossref","is-referenced-by-count":7,"title":["Network Intrusion Visualization with NIVA, an Intrusion Detection Visual and Haptic Analyzer"],"prefix":"10.1177","volume":"2","author":[{"given":"Craig","family":"Scott","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD, U.S.A."}]},{"given":"Kofi","family":"Nyarko","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD, U.S.A."}]},{"given":"Tanya","family":"Capers","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD, U.S.A."}]},{"given":"Jumoke","family":"Ladeji-Osias","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD, U.S.A."}]}],"member":"179","published-online":{"date-parts":[[2003,6,1]]},"reference":[{"key":"bibr1-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1109\/2.881696"},{"key":"bibr2-palgrave.ivs.9500044","doi-asserted-by":"crossref","unstructured":"Erbacher R, Frincke D. Visualization in detection of intrusions and misuse in large scale networks. International Conference on Information Visualization 2000 (London, UK, 2000); 294\u2013299.","DOI":"10.1109\/IV.2000.859771"},{"key":"bibr3-palgrave.ivs.9500044","unstructured":"Eick SG. Engineering perceptually effective visualizations for abstract data. Scientific Visualization Overviews, Methodologies and Techniques 1997, IEEE Computer Science Press: New York, 1997; 91\u2013210."},{"key":"bibr4-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1145\/245882.245901"},{"key":"bibr5-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1109\/2945.468391"},{"key":"bibr6-palgrave.ivs.9500044","doi-asserted-by":"crossref","unstructured":"Cox KC, Eick SG. 3D displays of internet traffic. Information Visualization Symposium 1995 (Atlanta, USA, 1995); 129\u2013132.","DOI":"10.1109\/INFVIS.1995.528697"},{"key":"bibr7-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.1993.398870"},{"key":"bibr8-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.1996.568108"},{"key":"bibr9-palgrave.ivs.9500044","unstructured":"Grinstein G. Workshop on information exploration shootout project and benchmark data sets: evaluating how visualization does in analyzing real-world data analysis problems. IEEE Visualization 97 Conference 1997 (Los Alamitos, USA, 1997), IEEE Computer Science Press: New York, 1997; 511\u2013513."},{"key":"bibr10-palgrave.ivs.9500044","doi-asserted-by":"crossref","unstructured":"Koutsofios E,  Visualizing large-scale telecommunication networks and services. IEEE Visualization 97 Conference (Los Alamitos, USA, 1997), IEEE Computer Science Press: New York, 1997; 457\u2013461.","DOI":"10.1109\/VISUAL.1999.809930"},{"key":"bibr11-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1109\/38.974517"},{"key":"bibr12-palgrave.ivs.9500044","doi-asserted-by":"crossref","unstructured":"Chalmers M, Chitson P. Bead: exploration on information visualization. 15th Annual International ACM\/SIGIR (Copenhagen, Denmark, 1992), IEEE Computer Science Press: New York, 1992: 330\u2013337.","DOI":"10.1145\/133160.133215"},{"key":"bibr13-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1177\/0951692899011001004"},{"key":"bibr14-palgrave.ivs.9500044","unstructured":"Axelsson S, Intrusion Detection Systems: A Survey and Taxonomy. Technical Report 99\u201315, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March 2000."},{"key":"bibr15-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1109\/6294.806742"},{"key":"bibr16-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1109\/52.877859"},{"key":"bibr17-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1995.1013"},{"key":"bibr18-palgrave.ivs.9500044","doi-asserted-by":"crossref","unstructured":"Walshaw A multilevel algorithm for force-directed graph drawing. Graph Drawing 2000 (Heidelberg, Germany, 2000), Lecture Notes in Computer Science 1984; 171\u2013182.","DOI":"10.1007\/3-540-44541-2_17"},{"key":"bibr19-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1145\/215585.215976"},{"key":"bibr20-palgrave.ivs.9500044","volume-title":"Problem-oriented visualisation of multi-dimensional data sets","author":"Lange S","year":"1995"},{"key":"bibr21-palgrave.ivs.9500044","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"bibr22-palgrave.ivs.9500044","doi-asserted-by":"crossref","unstructured":"Chuah M. Dynamic aggregation with circular visual designs. IEEE Symposium on Information Visualization (Research Triangle Park, USA, 1998); 35\u201343.","DOI":"10.1109\/INFVIS.1998.729557"},{"key":"bibr23-palgrave.ivs.9500044","first-page":"223","volume":"4","author":"Salisbury K.","year":"1995","journal-title":"HPCWire"},{"key":"bibr24-palgrave.ivs.9500044","unstructured":"Krenek A, Cernohorsky M, Kabelac Z. Haptic rendering of molecular flexibility. 2nd PHANToM Users Research Symposium (Zurich, Switzerland, 2000)."},{"key":"bibr25-palgrave.ivs.9500044","doi-asserted-by":"crossref","unstructured":"Mark W, Randolph S, Finch M, Verth J, Taylor R.II Adding force feedback to graphics systems: issues and solutions. SIGGRAPH (New Orleans, USA, 1996); 447\u2013452.","DOI":"10.1145\/237170.237284"},{"key":"bibr26-palgrave.ivs.9500044","unstructured":"Hayt W.Jr. Engineering Electromagnetics. McGraw-Hill: New York, 1989; 40\u201345."},{"key":"bibr27-palgrave.ivs.9500044","doi-asserted-by":"crossref","unstructured":"Nyarko K, Capers T, Scott C, Ladeji-Osias K. Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration. 10th International Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems 2002 (Orlando, USA, 2002); 277\u2013284.","DOI":"10.1109\/HAPTIC.2002.998969"}],"container-title":["Information Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/palgrave.ivs.9500044","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/palgrave.ivs.9500044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:19:04Z","timestamp":1777490344000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1057\/palgrave.ivs.9500044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,6]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,6]]}},"alternative-id":["10.1057\/palgrave.ivs.9500044"],"URL":"https:\/\/doi.org\/10.1057\/palgrave.ivs.9500044","relation":{},"ISSN":["1473-8716","1473-8724"],"issn-type":[{"value":"1473-8716","type":"print"},{"value":"1473-8724","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,6]]}}}