Network traffic exploration application: A tool to assess, visualize, and analyze network security events

被引:0
|
作者
Vandenberghe, Grant
机构
关键词
packet analysis; network forensics; visualization; covert tunnels;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Defence Research and Development Canada (DRDC) is developing a security event / packet analysis toot that is useful for analyzing a wide range of network attacks. The tool allows the security analyst to visually analyze a security event from a broad range of visual perspectives using a variety of detection algorithms. The tool is easy to extend and can be used to generate automated analysis scripts. The system architecture is presented and its capabilities are demonstrated through the analysis of several covert tunnels.
引用
收藏
页码:181 / 196
页数:16
相关论文
共 50 条
  • [31] NetADHICT: A tool for understanding network traffic
    Inoue, Hajime
    Jansens, Dana
    Hijazi, Abdulrahman
    Somayaji, Anil
    USENIX ASSOCIATION PROCEEDING OF THE 21ST LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2007, : 39 - +
  • [32] The application of tenacity to traffic network
    Wang, J
    Wang, ZP
    Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 2520 - 2523
  • [33] Research for Network Security and Reliability and Performance Assess
    Yang Yu-xing
    2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS, 2013, : 444 - 447
  • [34] LENTA: Longitudinal Exploration for Network Traffic Analysis
    Morichetta, Andrea
    Mellia, Marco
    PROCEEDINGS OF THE 2018 30TH INTERNATIONAL TELETRAFFIC CONGRESS (ITC 30), VOL 1, 2018, : 176 - 184
  • [35] Archipelago:: A network security analysis tool
    Stang, T
    Pourbayat, F
    Burgess, M
    Canright, G
    Engo, K
    Weltzien, Å
    USENIX ASSOCIATION PROCEEDINGS OF THE SEVENTEENTH LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2003, : 149 - 158
  • [36] Research on the design of network security situation sensor based on network traffic
    Yue, Peng
    Zhao, Limin
    Boletin Tecnico/Technical Bulletin, 2017, 55 (07): : 554 - 561
  • [37] Network Analysis of Qualitative Data: An Integrative Software Application to Visualize and Assess Similarities in Participants' Qualitative Contributions Comment
    Canche, Manuel S. Gonzalez
    JOURNAL OF MIXED METHODS RESEARCH, 2022, 16 (03) : 373 - 377
  • [38] VLBI network:A security net for lunar exploration
    SONG Jianlan (Staff Reporter)
    Bulletin of the Chinese Academy of Sciences, 2009, 23 (02) : 75 - 79
  • [39] Traffic Events Oriented Dynamic Traffic Assignment Model for Expressway Network: A Network Flow Approach
    Du, Lun
    Song, Guojie
    Wang, Yiming
    Huang, Jipeng
    Yu, Zhanyuan
    Ruan, Mengfei
    IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2018, 10 (01) : 107 - 120
  • [40] REINFORCEMENT LEARNING WITH SAFE EXPLORATION FOR NETWORK SECURITY
    Dai, Canhuang
    Xiao, Liang
    Wan, Xiaoyue
    Chen, Ye
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 3057 - 3061