Hierarchical visualization of network intrusion detection data

被引:32
|
作者
Itoh, T [1 ]
Takakura, H
Sawada, A
Koyamada, K
机构
[1] Ochanomizu Univ, Dept Informat Sci, Tokyo 112, Japan
[2] Kyoto Univ, Acad Ctr Comp & Media Studies, Kyoto, Japan
[3] Kyoto Univ, Ctr Promot Excellence Higher Educ, Kyoto, Japan
关键词
D O I
10.1109/MCG.2006.34
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article presents a visualization technique for log files of intrusion detection systems (IDSs), especially for a large-scale computer network connecting to thousands of computers. The technique first constructs hierarchical data of computers according to their IP addresses. It then visualizes the hierarchical data as bars and nested rectangles in a 2D display space, where bars denote computers and rectangles denote groups of computers. The technique represents the statistics of incidents for thousands of computers in one display space by mapping the number of incidents as bar heights. The technique attempts to minimize the display space; therefore, it enables the computers to be represented as clickable metaphors so that each computer's user interface presents its detail on demand. Also, the technique can help a user understand the relationship between a distribution of incidents and the organization of real society, because IP addresses are usually assigned according to the physical and organizational layouts of real society. The article introduces interesting behavior that the presented technique visualizes, including malicious accesses on real large-scale computer networks as discovered from over sixty thousands lines of a real IDS log file. © 2006 IEEE.
引用
收藏
页码:40 / 47
页数:8
相关论文
共 50 条
  • [41] Application of Unbalanced Data Approach to Network Intrusion Detection
    Zhao, Yueai
    Chen, Junjie
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 140 - +
  • [42] Research on the Application of the Data Mining in Network Intrusion Detection
    Shen, Wei
    2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
  • [43] Enhancing network based intrusion detection for imbalanced data
    Engen, Vegard
    Vincent, Jonathan
    Phalp, Keith
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2008, 12 (5-6) : 357 - 367
  • [44] Data stream mining architecture for network intrusion detection
    Chu, NCN
    Williams, A
    Alhajj, R
    Barker, K
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 363 - 368
  • [45] Hierarchical Density Estimates for Data Clustering, Visualization, and Outlier Detection
    Campello, Ricardo J. G. B.
    Moulavi, Davoud
    Zimek, Arthur
    Sander, Joerg
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2015, 10 (01)
  • [46] A Network Intrusion Detection System for Concept Drifting Network Traffic Data
    Andresini, Giuseppina
    Appice, Annalisa
    Loglisci, Corrado
    Belvedere, Vincenzo
    Redavid, Domenico
    Malerba, Donato
    DISCOVERY SCIENCE (DS 2021), 2021, 12986 : 111 - 121
  • [47] Network Data Visualization Using Parallel Coordinates Version of Time-tunnel with 2Dto2D Visualization for Intrusion Detection
    Okada, Yoshihiro
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 1088 - 1093
  • [48] Hybrid multi agent-neural network intrusion detection with mobile visualization
    Herrero, Alvaro
    Corchado, Emilio
    Pellicer, Maria A.
    Abraham, Ajith
    INNOVATIONS IN HYBRID INTELLIGENT SYSTEMS, 2007, 44 : 320 - +
  • [49] Network-wide intrusion detection supported by multivariate analysis and interactive visualization
    Theron, Roberto
    Magan-Carrion, Roberto
    Camacho, Jose
    Macia Fernandez, Gabriel
    2017 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2017,
  • [50] Nesting Circles: An Interactive Visualization Paradigm for Network Intrusion Detection System Alerts
    Shahryari, Mohammad-Salar
    Mohammad-Khanli, Leyli
    Ramezani, Majid
    Farzinvash, Leili
    Feizi-Derakhshi, Mohammad-Reza
    Security and Communication Networks, 2023, 2023