Hierarchical visualization of network intrusion detection data

被引:32
|
作者
Itoh, T [1 ]
Takakura, H
Sawada, A
Koyamada, K
机构
[1] Ochanomizu Univ, Dept Informat Sci, Tokyo 112, Japan
[2] Kyoto Univ, Acad Ctr Comp & Media Studies, Kyoto, Japan
[3] Kyoto Univ, Ctr Promot Excellence Higher Educ, Kyoto, Japan
关键词
D O I
10.1109/MCG.2006.34
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article presents a visualization technique for log files of intrusion detection systems (IDSs), especially for a large-scale computer network connecting to thousands of computers. The technique first constructs hierarchical data of computers according to their IP addresses. It then visualizes the hierarchical data as bars and nested rectangles in a 2D display space, where bars denote computers and rectangles denote groups of computers. The technique represents the statistics of incidents for thousands of computers in one display space by mapping the number of incidents as bar heights. The technique attempts to minimize the display space; therefore, it enables the computers to be represented as clickable metaphors so that each computer's user interface presents its detail on demand. Also, the technique can help a user understand the relationship between a distribution of incidents and the organization of real society, because IP addresses are usually assigned according to the physical and organizational layouts of real society. The article introduces interesting behavior that the presented technique visualizes, including malicious accesses on real large-scale computer networks as discovered from over sixty thousands lines of a real IDS log file. © 2006 IEEE.
引用
收藏
页码:40 / 47
页数:8
相关论文
共 50 条
  • [31] Towards Effective Network Intrusion Detection in Imbalanced Datasets: A Hierarchical Approach
    Towhid, Md Shamim
    Khan, Nasik Sami
    Hasan, Md Mahibul
    Shahriar, Nashid
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 254 - 258
  • [32] Intrusion detection of hierarchical distribution network system based on machine computation
    He X.
    International Journal of Information and Communication Technology, 2021, 18 (04) : 371 - 385
  • [33] CANET: A hierarchical CNN-Attention model for Network Intrusion Detection
    Ren, Keyan
    Yuan, Shuai
    Zhang, Chun
    Shi, Yu
    Huang, Zhiqing
    COMPUTER COMMUNICATIONS, 2023, 205 : 170 - 181
  • [34] Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data
    Zurutuza, Urko
    Ezpeleta, Enaitz
    Herrero, Alvaro
    Corchado, Emilio
    SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS, 6TH INTERNATIONAL CONFERENCE SOCO 2011, 2011, 87 : 561 - 570
  • [35] iDeFEND: Intrusion Detection Framework for Encrypted Network Data
    Kilic, Fatih
    Eckert, Claudia
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 111 - 118
  • [36] Network Intrusion Detection System Using Data Mining
    Lima de Campos, Lidio Mauro
    Limao de Oliveira, Roberto Celio
    Roisenberg, Mauro
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, 2012, 311 : 104 - 113
  • [37] Network Data Classification Mechanism for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 342 - 347
  • [38] A Survey on Data-driven Network Intrusion Detection
    Chou, Dylan
    Jiang, Meng
    ACM COMPUTING SURVEYS, 2022, 54 (09)
  • [39] Resampling imbalanced data for network intrusion detection datasets
    Bagui, Sikha
    Li, Kunqi
    JOURNAL OF BIG DATA, 2021, 8 (01)
  • [40] Resampling imbalanced data for network intrusion detection datasets
    Sikha Bagui
    Kunqi Li
    Journal of Big Data, 8