Network traffic exploration application: A tool to assess, visualize, and analyze network security events

被引:0
|
作者
Vandenberghe, Grant
机构
关键词
packet analysis; network forensics; visualization; covert tunnels;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Defence Research and Development Canada (DRDC) is developing a security event / packet analysis toot that is useful for analyzing a wide range of network attacks. The tool allows the security analyst to visually analyze a security event from a broad range of visual perspectives using a variety of detection algorithms. The tool is easy to extend and can be used to generate automated analysis scripts. The system architecture is presented and its capabilities are demonstrated through the analysis of several covert tunnels.
引用
收藏
页码:181 / 196
页数:16
相关论文
共 50 条
  • [1] NetViewer:A Visualization Tool for Network Security Events
    Zhang Jiawan
    Yang Peng
    Lu Liangfu
    Chen Lei
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 434 - 437
  • [2] Application of XGBoost to the cyber-security problem of detecting suspicious network traffic events
    Podlodowski, Lukasz
    Kozlowski, Marek
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5902 - 5907
  • [3] Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm
    Liu, Wei
    Yang, Dawei
    Zhang, Yakun
    2016 3RD INTERNATIONAL CONFERENCE ON MECHANICAL, INDUSTRIAL, AND MANUFACTURING ENGINEERING (MIME 2016), 2016, : 162 - 166
  • [4] Application of Grey Relation in Analyzing Network Security Events
    Qu Zhiming
    Wang Xiaoli
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 238 - +
  • [5] An Approach to Analyze Security of GSM Network
    Hadzialic, Mesud
    Skrbic, Mirko
    Huseinovic, Kemal
    Kocan, Irvin
    Musovic, Jasmin
    Hebibovic, Alisa
    Kasumagic, Lamija
    2014 22ND TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2014, : 99 - 102
  • [6] Advanced generation tool of application's network traffic
    Petroczi, Attila
    Molnar, Sandor
    IEEE International Performance, Computing and Communications Conference, Proceedings, 2000, : 471 - 477
  • [7] COnCUR - COherence in CURricula: A tool to assess, analyze and visualize coherence in higher education curricula
    Wengle, Emil
    Knorn, Steffi
    Varagnolo, Damiano
    IFAC PAPERSONLINE, 2020, 53 (02): : 17598 - 17603
  • [8] Application-Level Traffic Identification of Network Security Monitoring
    Lin, Zhenbiao
    Chen, Xingyuan
    Wang, Yongwei
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 738 - 742
  • [9] Process, Analyze and Visualize Telecommunication Network Configuration Data in Graph Database
    Lehotay-Kery, Peter
    Kiss, Attila
    VIETNAM JOURNAL OF COMPUTER SCIENCE, 2020, 7 (01) : 65 - 76
  • [10] A Unified Approach to Network Traffic and Network Security Visualisation
    Read, Huw
    Blyth, Andrew
    Sutherland, Iain
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 614 - 619