Focusing on context in network traffic analysis

被引:29
|
作者
Goodall, JR [1 ]
Lutters, WG
Rheingans, P
Komlodi, A
机构
[1] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21228 USA
[2] Univ Maryland Baltimore Cty, Dept Comp Sci, Baltimore, MD 21228 USA
关键词
D O I
10.1109/MCG.2006.31
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Intrusion detection analysis requires understanding the context of an event, usually discovered by examining packet-level detail. When analysts attempt to construct the big picture of a security event, they must move between high-level representations and these low-level details. This continual shifting places a substantial cognitive burden on the analyst, who must mentally store and transfer information between these levels of analysis. This article presents an information visualization tool, the time-based network traffic visualizer (TNV), which reduces this burden. TNV augments the available support for discovering and analyzing anomalous or malicious network activity. The system is grounded in an understanding of the work practices of intrusion detection analysts, particularly foregrounding the overarching importance in the analysis task of integrating contextual information into an understanding of the event under investigation. TNV provides low-level, textual data and multiple, linked visualizations that enable analysts to simultaneously examine packet-level detail within the larger context of activity. © 2006 IEEE.
引用
收藏
页码:72 / 80
页数:9
相关论文
共 50 条
  • [31] Performance analysis of multifractal network traffic
    Dang, TD
    Molnár, S
    Maricza, I
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2004, 15 (02): : 63 - 78
  • [32] Traffic analysis of European railway network
    Chesnais, M
    GEOGRAPHICAL INFORMATION '97: FROM RESEARCH TO APPLICATION THROUGH COOPERATION, VOLS 1 AND 2, 1997, : 819 - 823
  • [33] Comprehensive analysis of network traffic data
    Miao, Yuantian
    Ruan, Zichan
    Pan, Lei
    Zhang, Jun
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (05):
  • [34] Consistency Analysis of Network Traffic Repositories
    Lastdrager, Elmer
    Pras, Aiko
    INTERNET OF THE FUTURE, 2009, 5733 : 217 - 226
  • [35] Clustering Analysis for Malicious Network Traffic
    Wang, Jie
    Yang, Lili
    Wu, Jie
    Abawajy, Jemal H.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [36] Network Traffic Analysis in Service Ecosystems
    Wolfert, Christoph
    Haemmerle, Jochen
    Karduck, Achim P.
    2009 3RD IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2009, : 659 - 664
  • [37] NEMEA: A Framework for Network Traffic Analysis
    Cejka, Tomas
    Bartos, Vaclav
    Svepes, Marek
    Rosa, Zdenek
    Kubatova, Hana
    2016 12TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT AND WORKSHOPS(CNSM 2016), 2016, : 195 - 201
  • [38] Network traffic analysis with cloud platform
    Lin, R.C.H. (lin@cse.nsysu.edu.tw), 1600, Taiwan Academic Network Management Committee (13):
  • [39] Network Traffic Analysis of a Small Quadcopter
    Munari, Stefano
    Palazzi, Claudio E.
    Quadrio, Giacomo
    Ronzani, Daniele
    DRONET'17: PROCEEDINGS OF THE 3RD WORKSHOP ON MICRO AERIAL VEHICLE NETWORKS, SYSTEMS, AND APPLICATIONS, 2017, : 31 - 36
  • [40] Analysis and Detection of Anomalous Network Traffic
    Jeong, Hae-Duck J.
    Kim, Hyeonggeun
    Ahn, WonHwi
    Oh, Jung-hee
    Lee, Dawoon
    Ye, Sang-Kug
    Lee, Jongsuk R.
    2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 403 - 408