Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries

被引:14
作者
Conti, G [1 ]
Grizzard, J [1 ]
Ahamad, M [1 ]
Owen, H [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS | 2005年
关键词
binary object visualization; payload visualization; binary navigation; packet visualization; network visualization; reverse engineering;
D O I
10.1109/VIZSEC.2005.1532069
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores the application of visualization techniques to aid in the analysis of malicious and non-malicious binary objects. These objects may include any logically distinct chunks of binary data such as image files, word processing documents and network packets. To facilitate this analysis, we present a novel visualization technique for comparing and navigating among 600-1000+ such objects at one time. While the visualization technique alone has powerful application for both directed and undirected exploration of many classes of binary objects, we chose to study network packets. To increase effectiveness, we strengthened the visualization technique with novel, domain-specific semantic zooming, interacfive encoding and dynamic querying capabilities. We present results and lessons learned from implementing these techniques and from studying both malicious and non-malicious network packets. Our results indicate that the information visualization system we present is an efficient and effective way to compare large numbers of network packets, visually examine their payloads and navigate to areas of interest within large network datasets.
引用
收藏
页码:83 / 90
页数:8
相关论文
共 22 条
[1]  
AXELSSON S, 2004, ACM WORKSH VIS DAT M
[2]  
BALL R, 2004, ACM WORKSH VIS DAT M
[3]  
BEDERSON B, 1994, ACM S US INT SOFTW T
[4]  
BLAKE E, 2004, 8 INT C INF VIS IV
[5]  
CONTI G, 2004, ACM WORKSH VIS DAT M
[6]  
CONTI G, 2005, S US PRIV SEC SOUPS
[7]   Intrusion and misuse detection in large-scale systems [J].
Erbacher, RF ;
Walker, KL ;
Frincke, DA .
IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2002, 22 (01) :38-47
[8]  
GOLDRING T, 2004, ACM WORKSH VIS DAT M
[9]  
KE W, 2004, 7 INT S REC ADV INTR
[10]  
KOIKE H, 2004, ACM WORKSH VIS DAT M