Evaluating visualization approaches to detect abnormal activities in network traffic data

被引:9
作者
Ji, Soo-Yeon [1 ]
Jeong, Bong-Keun [2 ]
Jeong, Dong Hyun [3 ]
机构
[1] Bowie State Univ, Bowie, MD USA
[2] Coastal Carolina Univ, Conway, SC USA
[3] Univ Dist Columbia, Washington, DC 20008 USA
关键词
Network security; Intrusion detection; Visualization; Visual analytics; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION; GRAPH VISUALIZATION; SECURITY;
D O I
10.1007/s10207-020-00504-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing innovative approaches to detect intrusive network activities is considered as one of the most significant research topics in network security. Various computational methods are proposed to discover unknown attacks, but validating suspicious activities and understanding their unique characteristics are still difficult. To address this limitation, several visualization systems have been designed, which aim to enhance the ability of understanding data visually. However, the effectiveness of visualization techniques for network traffic data analysis has not been fully examined. In this paper, we performed in-depth literature review on visualization techniques for network traffic data analysis. From the review, we identified four key approaches that should be utilized in designing an effective network traffic visualization system: data filtration and transformation, pixel-based visualization, graph representation, and coordinated multi-views. To determine the effectiveness of the four visualization approaches, we developed several prototype visualizations and examined the complexity of implementation, requirement of data preprocessing, understandability of network patterns, and identifiability of abnormal network events.
引用
收藏
页码:331 / 345
页数:15
相关论文
共 50 条
[21]   Network Traffic Anomaly Detection using Machine Learning Approaches [J].
Limthong, Kriangkrai ;
Tawsook, Thidarat .
2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, :542-545
[22]   ODFM: Abnormal Traffic Detection Based on Optimization of Data Feature and Mining [J].
Wu, Xianzong .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) :1104-1109
[23]   Big Data Analytics and Visualization in Traffic Monitoring [J].
Bachechi, Chiara ;
Po, Laura ;
Rollo, Federica .
BIG DATA RESEARCH, 2022, 27
[24]   An Abnormal Network Traffic Detection Scheme Using Local Outlier Factor in SDN [J].
Nguyen Ngoc Tuan ;
Nguyen Danh Nghia ;
Pham Huy Hung ;
Dinh Khac Tuyen ;
Nguyen Minh Hieu ;
Nguyen Tai Hung ;
Nguyen Huu Thanh .
IEEE ICCE 2020: 2020 IEEE EIGHTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2021, :141-146
[25]   RESNETCNN:an Abnormal Network Traffic Flows Detection Model [J].
Li, Yimin ;
Han, Dezhi ;
Cui, Mingming ;
Yuan, Fan ;
Zhou, Yachao .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2023, 20 (03) :997-1014
[26]   Detecting LDoS Attacks based on Abnormal Network Traffic [J].
Chen, Kai ;
Liu, HuiYu ;
Chen, XiaoSu .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (07) :1831-1853
[27]   Study on the city traffic network features visualization in GIS [J].
Rui, Wang ;
Ling, Bai ;
Ma Detao ;
Gong Maoyu .
ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, :482-486
[28]   Evaluating the Data Visualization for Demanding Marine Operations [J].
Xu Zhuge ;
Hao Wang ;
Strazdins, Girts .
TECHNO-OCEAN 2016: RETURN TO THE OCEANS, 2016, :471-477
[29]   Evaluating the Usefulness of Software Visualization in Supporting Software Comprehension Activities [J].
Carneiro, Glauco de F. ;
Magnavita, Rodrigo ;
Spinola, Eduardo ;
Spinola, Fabio ;
Mendonca, Manoel .
ESEM'08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2008, :276-278
[30]   A Survey on Big Data for Network Traffic Monitoring and Analysis [J].
D'Alconzo, Alessandro ;
Drago, Idilio ;
Morichetta, Andrea ;
Mellia, Marco ;
Casas, Pedro .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03) :800-813