Evaluating visualization approaches to detect abnormal activities in network traffic data

被引:9
|
作者
Ji, Soo-Yeon [1 ]
Jeong, Bong-Keun [2 ]
Jeong, Dong Hyun [3 ]
机构
[1] Bowie State Univ, Bowie, MD USA
[2] Coastal Carolina Univ, Conway, SC USA
[3] Univ Dist Columbia, Washington, DC 20008 USA
关键词
Network security; Intrusion detection; Visualization; Visual analytics; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION; GRAPH VISUALIZATION; SECURITY;
D O I
10.1007/s10207-020-00504-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing innovative approaches to detect intrusive network activities is considered as one of the most significant research topics in network security. Various computational methods are proposed to discover unknown attacks, but validating suspicious activities and understanding their unique characteristics are still difficult. To address this limitation, several visualization systems have been designed, which aim to enhance the ability of understanding data visually. However, the effectiveness of visualization techniques for network traffic data analysis has not been fully examined. In this paper, we performed in-depth literature review on visualization techniques for network traffic data analysis. From the review, we identified four key approaches that should be utilized in designing an effective network traffic visualization system: data filtration and transformation, pixel-based visualization, graph representation, and coordinated multi-views. To determine the effectiveness of the four visualization approaches, we developed several prototype visualizations and examined the complexity of implementation, requirement of data preprocessing, understandability of network patterns, and identifiability of abnormal network events.
引用
收藏
页码:331 / 345
页数:15
相关论文
共 50 条
  • [1] Evaluating visualization approaches to detect abnormal activities in network traffic data
    Soo-Yeon Ji
    Bong-Keun Jeong
    Dong Hyun Jeong
    International Journal of Information Security, 2021, 20 : 331 - 345
  • [2] Big network traffic data visualization
    Zichan Ruan
    Yuantian Miao
    Lei Pan
    Yang Xiang
    Jun Zhang
    Multimedia Tools and Applications, 2018, 77 : 11459 - 11487
  • [3] Big network traffic data visualization
    Ruan, Zichan
    Miao, Yuantian
    Pan, Lei
    Xiang, Yang
    Zhang, Jun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11459 - 11487
  • [4] Neural visualization of network traffic data for intrusion detection
    Corchado, Emilio
    Herrero, Alvaro
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 2042 - 2056
  • [5] Visualization of Data Cubes for Anomaly Detection in Network Traffic Data Streams
    Ahlers, Volker
    Laue, Tim
    Wellermann, Nils
    Heine, Felix
    PROCEEDINGS OF THE THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 1, 2021, : 272 - 277
  • [6] Comparing Unsupervised Learning Approaches to Detect Network Intrusion Using NetFlow Data
    Zhang, Julina
    Jones, Kerry
    Song, Tianye
    Kang, Hyojung
    Brown, Donald E.
    2017 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), 2017, : 122 - 127
  • [7] Analyze University Network Traffic to Explore Usage Behaviour and to Detect Malicious Activities
    Gill, Harleen Kaur
    Singh, Maninder
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 686 - 691
  • [8] An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform
    Ji, Soo-Yeon
    Kamhoua, Charles
    Leslie, Nandi
    Jeong, Dong Hyun
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 666 - 672
  • [9] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
  • [10] An Abnormal Network Traffic Detection Algorithm Based on Big Data Analysis
    Yao, H. P.
    Liu, Y. Q.
    Fang, C.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2016, 11 (04) : 567 - 579