Hierarchical visualization of network intrusion detection data

被引:32
|
作者
Itoh, T [1 ]
Takakura, H
Sawada, A
Koyamada, K
机构
[1] Ochanomizu Univ, Dept Informat Sci, Tokyo 112, Japan
[2] Kyoto Univ, Acad Ctr Comp & Media Studies, Kyoto, Japan
[3] Kyoto Univ, Ctr Promot Excellence Higher Educ, Kyoto, Japan
关键词
D O I
10.1109/MCG.2006.34
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article presents a visualization technique for log files of intrusion detection systems (IDSs), especially for a large-scale computer network connecting to thousands of computers. The technique first constructs hierarchical data of computers according to their IP addresses. It then visualizes the hierarchical data as bars and nested rectangles in a 2D display space, where bars denote computers and rectangles denote groups of computers. The technique represents the statistics of incidents for thousands of computers in one display space by mapping the number of incidents as bar heights. The technique attempts to minimize the display space; therefore, it enables the computers to be represented as clickable metaphors so that each computer's user interface presents its detail on demand. Also, the technique can help a user understand the relationship between a distribution of incidents and the organization of real society, because IP addresses are usually assigned according to the physical and organizational layouts of real society. The article introduces interesting behavior that the presented technique visualizes, including malicious accesses on real large-scale computer networks as discovered from over sixty thousands lines of a real IDS log file. © 2006 IEEE.
引用
收藏
页码:40 / 47
页数:8
相关论文
共 50 条
  • [21] A REVIEW AND COMPARISON OF VISUALIZATION TECHNIQUES FOR NETWORK INTRUSION DETECTION SYSTEM
    Zaki, Fakhrul Adli Mohd
    Saman, Md Yazid Mohd
    Megat, Megat Fakruddin
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 407 - 414
  • [22] Distributed Hierarchical Pattern-Matching for Network Intrusion Detection
    Baig, Zubair
    Salah, Khaled
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 167 - 178
  • [23] The SVM and Layered Intrusion Detection System Based on Network Hierarchical
    Hu, Chao Ju
    Wang, Jin
    INTERNET OF THINGS-BK, 2012, 312 : 486 - 493
  • [24] A hierarchical CNN-Transformer model for network intrusion detection
    Luo, Sijie
    Zhao, Zhiheng
    Hu, Qiyuan
    Liu, Yang
    2ND INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, MODELLING, AND INTELLIGENT COMPUTING (CAMMIC 2022), 2022, 12259
  • [25] Data fusion and network intrusion detection systems
    Ahmad, Rasheed
    Alsmadi, Izzat
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7493 - 7519
  • [26] Research on Intelligent Detection of Intrusion Data in Network
    Zhu, Guangjie
    Yao, Honglei
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 5 - 10
  • [27] Data Fusion for Network Intrusion Detection: A Review
    Li, Guoquan
    Yan, Zheng
    Fu, Yulong
    Chen, Hanlu
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [28] Intrusion Detection Over Encrypted Network Data
    Karacay, Leyli
    Savas, Erkay
    Alptekin, Halit
    COMPUTER JOURNAL, 2020, 63 (04): : 604 - 619
  • [29] A Hierarchical Intrusion Detection System using Support Vector Machine for SDN Network in Cloud Data Center
    Schueller, Quentin
    Basu, Kashinath
    Younas, Muhammad
    Patel, Mohit
    Ball, Frank
    2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 380 - 385
  • [30] Case study: Visualization and information retrieval techniques for network intrusion detection
    Atkison, T
    Pensy, K
    Nicholas, C
    Ebert, D
    Atkison, R
    Morris, C
    DATA VISUALIZATION 2001, 2001, : 283 - +