Improving Security Visualization with Exposure Map Filtering

被引:3
作者
Alsalch, Mansour [1 ]
Barrera, David [1 ]
van Oorschot, P. C. [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
来源
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ACSAC.2008.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graphical analysis of network traffic flows helps security analysts detect patterns or behaviors that would not be obvious in a text-based environment. The growing volume of network data generated and captured makes it increasingly), difficult to detect increasing sophisticated reconnaissance and stealthy network attacks. We propose a network-flow filtering mechanism that leverages the exposure maps technique of Whyte et al. (2007), reducing the traffic for the visualization process according to the network services being offered. This allows focus to be limited to selected subsets of the network traffic, for example what might be categorized (correctly or otherwise) as the unexpected or potentially malicious portion. In particular; we use this technique to filter out traffic from sources that have not gained knowledge from the network in question. We evaluate the benefits of our technique on different visualizations of network,flows. Our analysis shows a significant decrease in the volume of network traffic that is to be visualized, resulting in visible patterns and insights not previously apparent.
引用
收藏
页码:205 / 214
页数:10
相关论文
共 20 条
  • [1] [Anonymous], 2004, P 2004 ACM WORKSH VI, DOI DOI 10.1145/1029208.1029220
  • [2] Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries
    Conti, G
    Grizzard, J
    Ahamad, M
    Owen, H
    [J]. IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, : 83 - 90
  • [3] Countering security information overload through alert and packet visualization
    Conti, G
    Abdullah, K
    Grizzard, J
    Stasko, J
    Copeland, JA
    Ahamad, M
    Owen, HL
    Lee, C
    [J]. IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2006, 26 (02) : 60 - 70
  • [4] Conti G., 2004, VIZSEC DMSEC 04, P45
  • [5] Conti Gregory, 2005, P 2005 S US PRIV SEC, P89, DOI DOI 10.1145/1073001.1073010
  • [6] GATES C, 2006, CMUSEI2006TR005
  • [7] Flow based observations from NETI@home and honeynet data
    Grizzard, JB
    Simpson, CR
    Krasser, S
    Owen, HL
    Riley, GF
    [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 244 - 251
  • [8] The spinning cube of potential doom
    Lau, S
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 25 - 26
  • [9] LBNL/ICSI, ENT TRAC PROJ
  • [10] A visualization methodology for characterization of network scans
    Muelder, C
    Ma, KL
    Bartoletti, T
    [J]. IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, : 29 - 38