Network Topology VisualizationConverting Network Information into a GraphBuilding a Communication MapBuilding the GraphIdentifying Suspicious Machine BehaviorSubgraph of Port Data VolumeIdentifying Unusual Levels of TrafficExamining How Machines Interact on the NetworkThe Proof of Concept: Network Traffic AnalysisSummary