A visualization paradigm for network intrusion detection

被引:38
|
作者
Livnat, Y [1 ]
Agutter, J [1 ]
Moon, S [1 ]
Erbacher, RF [1 ]
Foresti, S [1 ]
机构
[1] Univ Utah, Sci Comp & Imaging Inst, Salt Lake City, UT 84112 USA
关键词
D O I
10.1109/IAW.2005.1495939
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a novel paradigm for visual correlation of network alerts from disparate logs. This paradigm facilitates and promotes situational awareness in complex network environments. Our approach is based on the notion that, by definition, an alert must posses three attributes, namely: What, When, and Where. This fundamental premise, which we term omega(3), provides a vehicle for comparing between seemingly disparate events. We propose a concise and scalable representation of these three attributes, that leads to a flexible visualization tool that is also clear and intuitive to use. Within our system, alerts can be grouped and viewed hierarchically with respect to both their type, i.e., the What, and to their Where attributes. Further understanding is gained by displaying the temporal distribution of alerts to reveal complex attack trends. Finally, we propose a set of visual metaphor extensions that augment the proposed paradigm and enhance users' situational awareness. These metaphors direct the attention of users to many-to-one correlations within the current display helping them detect abnormal network activity.
引用
收藏
页码:92 / 99
页数:8
相关论文
共 50 条
  • [31] An Approach to Intrusion Detection by Means of Idiotypic Networks Paradigm
    Ostaszewski, Marek
    Bouvry, Pascal
    Seredynski, Franciszek
    2008 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-8, 2008, : 2099 - +
  • [32] Recurrent network in Network Intrusion Detection System
    Xue, JS
    Sun, JZ
    Zhang, X
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2676 - 2679
  • [33] Anomaly detection schemes in network intrusion detection
    Corvera, S
    Grau, JB
    Andina, D
    Soft Computing with Industrial Applications, Vol 17, 2004, 17 : 309 - 313
  • [34] Abnormal traffic detection for network intrusion detection
    Heo, YJ
    Ryu, KW
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 387 - 390
  • [35] An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
    Liu, Jiannan
    Xiao, Kun
    Luo, Lei
    Li, Yun
    Chen, Lirong
    2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 122 - 129
  • [36] Exploring three-dimensional visualization for intrusion detection
    Oline, A
    Reiners, D
    IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, : 113 - 120
  • [37] User requirements and design of a visualization for intrusion detection analysis
    Goodall, JR
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 394 - 401
  • [38] Machine Learning Combining with Visualization for Intrusion Detection: A Survey
    Yu, Yang
    Long, Jun
    Liu, Fang
    Cai, Zhiping
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, (MDAI 2016), 2016, 9880 : 239 - 249
  • [39] Markov chains in network intrusion detection
    Hixon, R
    Gruenbacher, DA
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 432 - 433
  • [40] Visualizing network data for intrusion detection
    Abdullah, K
    Lee, A
    Conti, G
    Copeland, JA
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108