A Survey of Network Traffic Visualization in Detecting Network Security Threats

被引:2
作者
Liu, Xiaomei [1 ,3 ]
Sun, Yong [1 ,3 ]
Fang, Liang [2 ,3 ]
Liu, Junpeng [1 ,3 ]
Yu, Lingjing [1 ,3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing 100088, Peoples R China
[3] Natl Engn Lab Informat Secur Technol, Beijing, Peoples R China
来源
TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014) | 2015年 / 520卷
关键词
Network traffic; Network security; Visualization;
D O I
10.1007/978-3-662-47401-3_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing network traffic to detect network security threats has drawn attentions from security researchers for decades. However, the new characteristics of network traffic, such as explosive growth, more diverse attack types and higher dimension, have brought us new challenges. Because of these challenges, traditional detecting technologies like log analysis cannot directly identify threats from traffic in time. Visualization can straightly and quickly display multi-dimensional information of large network traffic. It can be our powerful weapon to meet the challenges. In this paper, we classify the network traffic into four layers. According to different layer, we systematically survey several well-known network traffic visualization systems. Then we analyze the advantages and disadvantages for each system and give out the comparisons. We also introduce the future works for network traffic visualization.
引用
收藏
页码:91 / 98
页数:8
相关论文
共 17 条
[1]  
Allen M, 2009, NAV NETWORK ANAL VIS
[2]  
[Anonymous], 2004, IEEE S VIS CYB SEC, DOI [DOI 10.1145/1029208.1029217, 10.1145/1029208.1029217]
[3]  
[Anonymous], 2004, P 2004 ACM WORKSH VI, DOI DOI 10.1145/1029208.1029220
[4]  
BETHEL EW, 2006, IEEE S VIS AN SCI TE
[5]  
Fischer F, 2008, LECT NOTES COMPUT SC, V5210, P111
[6]  
Kim S.S., 2005, LISA 2005 PAPER
[7]   The spinning cube of potential doom [J].
Lau, S .
COMMUNICATIONS OF THE ACM, 2004, 47 (06) :25-26
[8]  
[刘轶 LIU Yi], 2007, [微电子学与计算机, Microelectronics & Computer], V24, P153
[9]  
Lu Liang-fu, 2008, Journal of Computer Applications, V28, P1924, DOI 10.3724/SP.J.1087.2008.01924
[10]  
McCormick B., 1987, COMPUT GRAPHICS, V12, P1103