A visualization paradigm for network intrusion detection

被引:38
|
作者
Livnat, Y [1 ]
Agutter, J [1 ]
Moon, S [1 ]
Erbacher, RF [1 ]
Foresti, S [1 ]
机构
[1] Univ Utah, Sci Comp & Imaging Inst, Salt Lake City, UT 84112 USA
关键词
D O I
10.1109/IAW.2005.1495939
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a novel paradigm for visual correlation of network alerts from disparate logs. This paradigm facilitates and promotes situational awareness in complex network environments. Our approach is based on the notion that, by definition, an alert must posses three attributes, namely: What, When, and Where. This fundamental premise, which we term omega(3), provides a vehicle for comparing between seemingly disparate events. We propose a concise and scalable representation of these three attributes, that leads to a flexible visualization tool that is also clear and intuitive to use. Within our system, alerts can be grouped and viewed hierarchically with respect to both their type, i.e., the What, and to their Where attributes. Further understanding is gained by displaying the temporal distribution of alerts to reveal complex attack trends. Finally, we propose a set of visual metaphor extensions that augment the proposed paradigm and enhance users' situational awareness. These metaphors direct the attention of users to many-to-one correlations within the current display helping them detect abnormal network activity.
引用
收藏
页码:92 / 99
页数:8
相关论文
共 50 条
  • [1] Nesting Circles: An Interactive Visualization Paradigm for Network Intrusion Detection System Alerts
    Shahryari, Mohammad-Salar
    Mohammad-Khanli, Leyli
    Ramezani, Majid
    Farzinvash, Leili
    Feizi-Derakhshi, Mohammad-Reza
    Security and Communication Networks, 2023, 2023
  • [2] Hierarchical visualization of network intrusion detection data
    Itoh, T
    Takakura, H
    Sawada, A
    Koyamada, K
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2006, 26 (02) : 40 - 47
  • [3] Dimensionality Reduction and Visualization of Network Intrusion Detection Data
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 441 - 455
  • [4] Neural visualization of network traffic data for intrusion detection
    Corchado, Emilio
    Herrero, Alvaro
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 2042 - 2056
  • [5] Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration
    Nyarko, K
    Capers, T
    Scott, C
    Ladeji-Osias, K
    10TH SYMPOSIUM ON HAPTIC INTERFACES FOR VIRTUAL ENVIRONMENT AND TELEOPERATOR SYSTEMS, PROCEEDINGS, 2002, : 277 - 284
  • [6] Network intrusion detection system using supervised learning paradigm
    Mebawondu, J. Olamantanmi
    Alowolodu, Olufunso D.
    Mebawondu, Jacob O.
    Adetunmbi, Adebayo O.
    SCIENTIFIC AFRICAN, 2020, 9
  • [7] Investigation of network intrusion detection using data visualization methods
    Bulavas, Viktoras
    2018 59TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT SCIENCE OF RIGA TECHNICAL UNIVERSITY (ITMS), 2018,
  • [8] A REVIEW AND COMPARISON OF VISUALIZATION TECHNIQUES FOR NETWORK INTRUSION DETECTION SYSTEM
    Zaki, Fakhrul Adli Mohd
    Saman, Md Yazid Mohd
    Megat, Megat Fakruddin
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 407 - 414
  • [9] An immune paradigm for intrusion detection
    Liu, Xiaojie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 365 - 369
  • [10] A 3D Approach for the Visualization of Network Intrusion Detection Data
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    2018 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2018, : 308 - 315