When audit trails are displayed graphically, they can take the form of inter-related nodes, edges, and (sub)graphs. Such is the case with the depictions generated by the Visual Audit Browser Frame Generator and Movie Maker.
It is often useful to take a low-level graph and convert these into less complicated, higher level, graphs. One might want to convert the several nodes and edges that make up a login and reduce it down to a couple nodes and edges. Some possible applications of these types of graph reductions are:
attack signature analysis
anomaly detection
misuse detection
audit log summaries
intrusion detection system construction
intrusion detection systems
See this example of a graph reduction.
Last revised 12-Oct-94 by Jim Hoagland