Graphing Attacks
You use graphic analytics to quickly identify high-volume attackers or targets at a glance. You can locate and typify cascading attacks (for example, worms and viruses), and isolate and analyze events involving interactions between two or more devices (for example, threat discovery).
-
The event data you visualize can be static (a snapshot of the selected events) or live (continuously updated with specified real-time event data). You create static graphs by selecting certain event data out of a source and displaying it as a graphic. See Creating Static Event Graphs.
-
You create live graphs using a graphic data monitor type or an active list. See Creating Live Event Graphs.
-
See Event Graph Notes for descriptions of the graphical elements on an event graph.
-
See Configuring Event Graphs to set or change your event graph preferences.