Exploring three-dimensional visualization for intrusion detection

被引:12
作者
Oline, A [1 ]
Reiners, D [1 ]
机构
[1] Iowa State Univ, Dept Comp Sci, Ames, IA 50011 USA
来源
IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS | 2005年
关键词
intrusion detection; visualization; data reduction; three-dimensional;
D O I
10.1109/VIZSEC.2005.1532073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems have been popular tools in the battle against adversaries who, for whatever reason, desire to break into networks, compromise hosts, and steal valuable information. One problem with current implementations, however, is the sheer number of alerts they can generate, many of which tend to be false alarms. This drawback makes effective use of such systems a challenging task. In this paper we explore three-dimensional approaches to visualizing network intrusion detection system alerts and aggregated network statistics in order to provide the system administrator with a better picture of the events occurring on his or her network. While some research has been done using two-dimensional concepts, 3D approaches have not received much attention with regard to detecting network intrusions. Evaluation of our visualizations using the 1999 DARPA Intrusion Detection Evaluation data set demonstrates the potential benefit of utilizing the third dimension. We show how a number of attack types in the data set generate visual evidence of abnormal activity that a security administrator might use as motivation for further investigation.
引用
收藏
页码:113 / 120
页数:8
相关论文
共 13 条
[1]  
ATKISON T, 2001, P JOINT EUR IEEE TCV
[2]  
Axelsson S, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P1, DOI 10.1145/319709.319710
[3]  
Erbacher R. F., 2001, Visualization, Imaging, and Image Processing. Proceedings of the IASTED International Conference, P54
[4]  
INSELBERG A, 1981, N DIMENSIONAL GRAP 1
[5]  
KENDALL K, 1998, THESIS MIT
[6]  
Koike H., 2004, P 2004 ACMWORKSHOP V, P143, DOI DOI 10.1145/1029208.1029232
[7]   The 1999 DARPA off-line intrusion detection evaluation [J].
Lippmann, R ;
Haines, JW ;
Fried, DJ ;
Korba, J ;
Das, K .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04) :579-595
[8]  
McPherson Jonathan., 2004, P 2004 ACM WORKSHOP, P73
[9]  
PATTON S, 2001, RAID 2001 PROGRAM
[10]  
Roesch M, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), P229