Network traffic exploration application: A tool to assess, visualize, and analyze network security events

被引:0
|
作者
Vandenberghe, Grant
机构
关键词
packet analysis; network forensics; visualization; covert tunnels;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Defence Research and Development Canada (DRDC) is developing a security event / packet analysis toot that is useful for analyzing a wide range of network attacks. The tool allows the security analyst to visually analyze a security event from a broad range of visual perspectives using a variety of detection algorithms. The tool is easy to extend and can be used to generate automated analysis scripts. The system architecture is presented and its capabilities are demonstrated through the analysis of several covert tunnels.
引用
收藏
页码:181 / 196
页数:16
相关论文
共 50 条
  • [21] Using Machine Learning to Analyze Network Traffic Anomalies
    Khudoyarova, Anastasia
    Burlakov, Mikhail
    Kupriyashin, Mikhail
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 2344 - 2348
  • [22] Network Security's security management tool
    不详
    COMPUTER, 1999, 32 (11) : 121 - 122
  • [23] FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS CORRELATION WITH NETWORK SECURITY
    Ding, Caichang
    Chen, Yiqin
    Liu, Zhiyuan
    Alshehri, Ahmed Mohammed
    Liu, Tianyin
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2022, 30 (02)
  • [24] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
  • [25] Classification of Network Traffic Using Fuzzy Clustering for Network Security
    Fries, Terrence P.
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, ICDM 2017, 2017, 10357 : 278 - 285
  • [26] MAVisto:: a tool for the exploration of network motifs
    Schreiber, F
    Schwöbbermeyer, H
    BIOINFORMATICS, 2005, 21 (17) : 3572 - 3574
  • [27] Visualization for Monitoring Network Security Events
    Humphries, Christopher
    Prigent, Nicolas
    Bidan, Christophe
    ERCIM NEWS, 2012, (90): : 31 - 32
  • [28] Network Embedding Exploration Tool (NEExT)
    Dehghan, Ashkan
    Pralat, Pawel
    Theberge, Francois
    MODELLING AND MINING NETWORKS, WAW 2024, 2024, 14671 : 65 - 79
  • [29] A software tool for network traffic analysis
    Sun, F.
    Tzeng, H.
    SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 190 - +
  • [30] AKQUI - A network traffic measurement tool
    Lamparter, O
    Stauffer, B
    ICT'2003: 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS I AND II, CONFERENCE PROCEEDINGS, 2003, : 1078 - 1083