Write a Blog >>

In this paper, we present a novel method for visualizing the tomography of network flows. We offer visual cues to spot correlated network flows by conducting co-occurrence and sequence mining. We can focus the analysis of network flows on particular layer and map workflows of networked applications to the tomography. We show that our visualization method offers more intuitive means to track down the complicated symptoms of advanced and covert security threats.