COMBINING VISUALIZATION AND INTERACTION FOR SCALABLE DETECTION OF ANOMALIES IN NETWORK DATA

被引:0
|
作者
Erbacher, Robert F. [1 ]
Forcht, Karen A. [2 ]
机构
[1] Utah State Univ, Logan, UT 84322 USA
[2] N Carolina Agr & Tech State Univ, Greensboro, NC 27411 USA
关键词
Visualization; Network Data; Visual Analytics; Computer Security; Sophisticated Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper examines the application of visualization to identify and analyze sophisticated network attacks. Given the size and chaotic nature of this type of data needing to be analyzed in order to identify such attacks, novel integrations of visualization and interaction are required. Essentially, the design of the visualization technique had to be performed hand in hand with interaction techniques to ensure that should clusters of activity be identified and need analysis then the user would be able to interact with those clusters. This differs from most visualization work which does not allow for such direct manipulation and thus greatly limits the usability of many techniques for this type of data. This paper discusses the developed visualization techniques and present real world data examples in which both injected and actual attacks are identified. This identification required the examination and removal from consideration, activity deemed to be innocuous.
引用
收藏
页码:117 / 126
页数:10
相关论文
共 50 条
  • [1] Network protocol for interaction and scalable distributed visualization
    Frahm, JM
    Evers-Senne, JF
    Koch, R
    FIRST INTERNATIONAL SYMPOSIUM ON 3D DATA PROCESSING VISUALIZATION AND TRANSMISSION, 2002, : 44 - 47
  • [2] Anomalies detection in mobile network management data
    Anisetti, Marco
    Ardagna, Claudio A.
    Bellandi, Valerio
    Bernardoni, Elisa
    Damiani, Ernesto
    Reale, Salvatore
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 943 - +
  • [3] Combining Spark and Snort Technologies for Detection of Network Attacks and Anomalies: Assessment of Performance for the Big Data Framework
    Kotenko, Igor
    Komashinsky, Nikolay
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [4] Combining Network Visualization and Data Mining for Tax Risk Assessment
    Didimo, Walter
    Grilli, Luca
    Liotta, Giuseppe
    Menconi, Lorenzo
    Montecchiani, Fabrizio
    Pagliuca, Daniele
    IEEE ACCESS, 2020, 8 : 16073 - 16086
  • [5] Combining Network Visualization and Data Mining for Tax Risk assessment
    Didimo W.
    Grilli L.
    Liotta G.
    Menconi L.
    Montecchiani F.
    Pagliuca D.
    IEEE Access, 2020, 8 : 16073 - 16086
  • [6] Hierarchical visualization of network intrusion detection data
    Itoh, T
    Takakura, H
    Sawada, A
    Koyamada, K
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2006, 26 (02) : 40 - 47
  • [7] Scalable visualization of event data
    Taylor, DJ
    Halim, N
    Hellerstein, JL
    Ma, S
    SERVICES MANAGEMENT IN INTELLIGENT NETWORKS, PROCEEDINGS, 2000, 1960 : 47 - 58
  • [8] Scalable Interactive Data Visualization
    Chen, Florian
    Gaertner, Thomas
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES-RESEARCH TRACK AND DEMO TRACK, PT VIII, ECML PKDD 2024, 2024, 14948 : 429 - 433
  • [9] A Visualization and Interaction System of Multivariate Movie Network Data
    Qian, Dong
    Yang, Cheng
    Li, Chen
    Bai, Ling
    2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP), 2016, : 379 - 383
  • [10] Neural visualization of network traffic data for intrusion detection
    Corchado, Emilio
    Herrero, Alvaro
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 2042 - 2056