Hierarchical visualization of network intrusion detection data

被引:32
|
作者
Itoh, T [1 ]
Takakura, H
Sawada, A
Koyamada, K
机构
[1] Ochanomizu Univ, Dept Informat Sci, Tokyo 112, Japan
[2] Kyoto Univ, Acad Ctr Comp & Media Studies, Kyoto, Japan
[3] Kyoto Univ, Ctr Promot Excellence Higher Educ, Kyoto, Japan
关键词
D O I
10.1109/MCG.2006.34
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article presents a visualization technique for log files of intrusion detection systems (IDSs), especially for a large-scale computer network connecting to thousands of computers. The technique first constructs hierarchical data of computers according to their IP addresses. It then visualizes the hierarchical data as bars and nested rectangles in a 2D display space, where bars denote computers and rectangles denote groups of computers. The technique represents the statistics of incidents for thousands of computers in one display space by mapping the number of incidents as bar heights. The technique attempts to minimize the display space; therefore, it enables the computers to be represented as clickable metaphors so that each computer's user interface presents its detail on demand. Also, the technique can help a user understand the relationship between a distribution of incidents and the organization of real society, because IP addresses are usually assigned according to the physical and organizational layouts of real society. The article introduces interesting behavior that the presented technique visualizes, including malicious accesses on real large-scale computer networks as discovered from over sixty thousands lines of a real IDS log file. © 2006 IEEE.
引用
收藏
页码:40 / 47
页数:8
相关论文
共 50 条
  • [1] Dimensionality Reduction and Visualization of Network Intrusion Detection Data
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 441 - 455
  • [2] Neural visualization of network traffic data for intrusion detection
    Corchado, Emilio
    Herrero, Alvaro
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 2042 - 2056
  • [3] Investigation of network intrusion detection using data visualization methods
    Bulavas, Viktoras
    2018 59TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT SCIENCE OF RIGA TECHNICAL UNIVERSITY (ITMS), 2018,
  • [4] Network Intrusion Detection: Based on Deep Hierarchical Network and original Flow Data
    Zhang, Yong
    Chen, Xu
    Jin, Lei
    Wang, Xiaojuan
    Guo, Da
    IEEE ACCESS, 2019, 7 : 37004 - 37016
  • [5] A visualization paradigm for network intrusion detection
    Livnat, Y
    Agutter, J
    Moon, S
    Erbacher, RF
    Foresti, S
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 92 - 99
  • [6] A 3D Approach for the Visualization of Network Intrusion Detection Data
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    2018 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2018, : 308 - 315
  • [7] Hybrid hierarchical network intrusion detection
    Yang, Hong-Yu
    Xie, Li-Xia
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2702 - +
  • [8] Hierarchical Autoencoder for Network Intrusion Detection
    Kye, Hyoseon
    Kim, Miru
    Kwon, Minhae
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 2700 - 2705
  • [9] Interactive visualization of fused intrusion detection data
    Avitia, Serafin
    Kurkowski, Stuart
    van der Hoeven, Luke
    3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 27 - 36
  • [10] Interactive three-dimensional visualization of network intrusion detection data for machine learning
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 292 - 306