A visualization methodology for characterization of network scans

被引:14
作者
Muelder, C [1 ]
Ma, KL [1 ]
Bartoletti, T [1 ]
机构
[1] Univ Calif Davis, Davis, CA 95616 USA
来源
IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS | 2005年
关键词
information visualization; security visualization; graph visualization; clustering; wavelets; scalograms; network scans; cyber forensics; adversary characterization;
D O I
10.1109/VIZSEC.2005.1532063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many methods have been developed for monitoring network traffic, both using visualization and statistics. Most of these methods focus on the detection of suspicious or malicious activities. But what they often fail to do refine and exercise measures that contribute to the characterization of such activities and their sources, once they are detected. In particular, many tools exist that detect network scans or visualize them at a high level, but not very many tools exist that are capable of categorizing and analyzing network scans. This paper presents a means of facilitating the process of characterization by using visualization and statistics techniques to analyze the patterns found in the timing of network scans through a method of continuous improvement in measures that serve to separate the components of interest in the characterization so the user can control separately for the effects of attack tool employed, performance characteristics of the attack platform, and the effects of network routing in the arrival patterns of hostile probes. The end result is a system that allows large numbers of network scans to be rapidly compared and subsequently identified.
引用
收藏
页码:29 / 38
页数:10
相关论文
共 14 条
[1]  
[Anonymous], 2001, P ACM CSS WORKSH DAT
[2]  
[Anonymous], 2004, P 2004 ACM WORKSH VI, DOI DOI 10.1145/1029208.1029220
[3]   VISUALIZING NETWORK DATA [J].
BECKER, RA ;
EICK, SG ;
WILKS, AR .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 1995, 1 (01) :16-28
[4]  
Conti G., 2004, VIZSEC DMSEC 04, P45
[5]   Visual traffic monitoring and evaluation [J].
Erbacher, RF .
INTERNET PERFORMANCE AND CONTROL OF NETWORK SYSTEMS II, 2001, 4523 :153-160
[6]  
Girardin L, 1998, PROCEEDINGS OF THE TWELFTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XII), P299
[7]   AN INTRODUCTION TO WAVELETS [J].
GRAPS, A .
IEEE COMPUTATIONAL SCIENCE & ENGINEERING, 1995, 2 (02) :50-61
[8]  
HO TK, 2002, P ASTR DAT AN SOFTW
[9]  
Kohonen T., 1984, Self-Organization and Associative Memory
[10]  
LAKKARAJU K, 2003, INT MULT MEAS MOD EV