Focusing on context in network traffic analysis

被引:29
|
作者
Goodall, JR [1 ]
Lutters, WG
Rheingans, P
Komlodi, A
机构
[1] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21228 USA
[2] Univ Maryland Baltimore Cty, Dept Comp Sci, Baltimore, MD 21228 USA
关键词
D O I
10.1109/MCG.2006.31
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Intrusion detection analysis requires understanding the context of an event, usually discovered by examining packet-level detail. When analysts attempt to construct the big picture of a security event, they must move between high-level representations and these low-level details. This continual shifting places a substantial cognitive burden on the analyst, who must mentally store and transfer information between these levels of analysis. This article presents an information visualization tool, the time-based network traffic visualizer (TNV), which reduces this burden. TNV augments the available support for discovering and analyzing anomalous or malicious network activity. The system is grounded in an understanding of the work practices of intrusion detection analysts, particularly foregrounding the overarching importance in the analysis task of integrating contextual information into an understanding of the event under investigation. TNV provides low-level, textual data and multiple, linked visualizations that enable analysts to simultaneously examine packet-level detail within the larger context of activity. © 2006 IEEE.
引用
收藏
页码:72 / 80
页数:9
相关论文
共 50 条
  • [41] Multiscale Analysis and Prediction of Network Traffic
    Zhao, Hong
    2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 388 - 393
  • [42] Queueing analysis of multiscale network traffic
    Hong, F
    Bai, Y
    PERFORMANCE CHALLENGES FOR EFFICIENT NEXT GENERATION NETWORKS, VOLS 6A-6C, 2005, 6A-6C : 2317 - 2325
  • [43] Review on Network Traffic Measurements and Analysis
    Nimkar, Sneha
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 815 - 820
  • [44] Two tools for network traffic analysis
    Ayedemir, M
    Bottomley, L
    Coffin, M
    Jeffries, C
    Kiessler, P
    Kumar, K
    Ligon, W
    Marin, J
    Nilsson, A
    McGovern, J
    Rindos, A
    Vu, K
    Woolet, S
    Zaglou, A
    Zhu, K
    COMPUTER NETWORKS, 2001, 36 (2-3) : 169 - 179
  • [45] Network Traffic Analysis of Medical Devices
    Mashnoor, Nowfel
    Charyyev, Batyr
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [46] A Behavioral Analysis Engine for Network Traffic
    Faezipour, Miad
    Nourani, Mehrdad
    Addepalli, Sateesh
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 138 - +
  • [47] Situational awareness and network traffic analysis
    McHugh, J
    Gates, C
    Becknel, D
    Cyberspace Security and Defense: Research Issues, 2005, 196 : 209 - 228
  • [48] A signal analysis of network traffic anomalies
    Barford, P
    Kline, J
    Plonka, D
    Ron, A
    IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, 2002, : 71 - 82
  • [49] Density and Context Aware Network with Hierarchical Head for Traffic Scene Detection
    Ge, Zuhao
    Yu, Wenhao
    Liu, Xian
    Qi, Lizhe
    Sun, Yunquan
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [50] User Equilibrium Analysis Considering Travelers' Context-Dependent Route Choice Behavior on the Risky Traffic Network
    Xu, Qinghui
    Ji, Xiangfeng
    SUSTAINABILITY, 2020, 12 (17)