A visualization paradigm for network intrusion detection

被引:38
|
作者
Livnat, Y [1 ]
Agutter, J [1 ]
Moon, S [1 ]
Erbacher, RF [1 ]
Foresti, S [1 ]
机构
[1] Univ Utah, Sci Comp & Imaging Inst, Salt Lake City, UT 84112 USA
关键词
D O I
10.1109/IAW.2005.1495939
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a novel paradigm for visual correlation of network alerts from disparate logs. This paradigm facilitates and promotes situational awareness in complex network environments. Our approach is based on the notion that, by definition, an alert must posses three attributes, namely: What, When, and Where. This fundamental premise, which we term omega(3), provides a vehicle for comparing between seemingly disparate events. We propose a concise and scalable representation of these three attributes, that leads to a flexible visualization tool that is also clear and intuitive to use. Within our system, alerts can be grouped and viewed hierarchically with respect to both their type, i.e., the What, and to their Where attributes. Further understanding is gained by displaying the temporal distribution of alerts to reveal complex attack trends. Finally, we propose a set of visual metaphor extensions that augment the proposed paradigm and enhance users' situational awareness. These metaphors direct the attention of users to many-to-one correlations within the current display helping them detect abnormal network activity.
引用
收藏
页码:92 / 99
页数:8
相关论文
共 50 条
  • [21] Interactive visualization of fused intrusion detection data
    Avitia, Serafin
    Kurkowski, Stuart
    van der Hoeven, Luke
    3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 27 - 36
  • [22] Fusion and summarization of behavior for intrusion detection visualization
    Erbacher, RF
    Garber, M
    PROCEEDINGS OF THE FOURTH IASTED INTERNATIONAL CONFERENCE ON VISUALIZATION, IMAGING, AND IMAGE PROCESSING, 2004, : 159 - 165
  • [23] CyberVTI: Cyber Visualization Tool for Intrusion Detection
    Marques, Pedro
    Dias, Luis
    Correia, Miguel
    2021 IEEE 20TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2021,
  • [24] Fuzzy feature extraction and visualization for intrusion detection
    Xin, JQ
    Dickerson, JE
    Dickerson, JA
    PROCEEDINGS OF THE 12TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1 AND 2, 2003, : 1249 - 1254
  • [25] A Novel Radial Visualization of Intrusion Detection Alerts
    Shi, Yang
    Zhao, Ying
    Zhou, Fangfang
    Shi, Ronghua
    Zhang, Yaoxue
    Wang, Guojun
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2018, 38 (06) : 83 - 95
  • [26] Fast Detection of Network Intrusion
    Chen, Xinjia
    Walker, Ernest
    DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2011, 2011, 8062
  • [27] Hybrid Network Intrusion Detection
    Tahmoush, David
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE XIII, 2014, 9074
  • [28] An efficient network intrusion detection
    Chen, Chia-Mei
    Chen, Ya-Lin
    Lin, Hsiao-Chung
    COMPUTER COMMUNICATIONS, 2010, 33 (04) : 477 - 484
  • [29] Counselors network for intrusion detection
    Quincozes, Silvio E.
    Raniery, Carlos
    Nunes, Raul Ceretta
    Albuquerque, Celio
    Passos, Diego
    Mosse, Daniel
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (03)
  • [30] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104