Network traffic exploration application: A tool to assess, visualize, and analyze network security events

被引:0
|
作者
Vandenberghe, Grant
机构
关键词
packet analysis; network forensics; visualization; covert tunnels;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Defence Research and Development Canada (DRDC) is developing a security event / packet analysis toot that is useful for analyzing a wide range of network attacks. The tool allows the security analyst to visually analyze a security event from a broad range of visual perspectives using a variety of detection algorithms. The tool is easy to extend and can be used to generate automated analysis scripts. The system architecture is presented and its capabilities are demonstrated through the analysis of several covert tunnels.
引用
收藏
页码:181 / 196
页数:16
相关论文
共 50 条
  • [41] Improving network security by multipath traffic dispersion
    Yang, J
    Papavasiliou, S
    2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 34 - 38
  • [42] Security Evaluation of Hosts Based on Network Traffic
    Gao, Cuixia
    Li, Zhitang
    Chen, Lin
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 901 - 905
  • [43] Fuzzy Clustering of Network Traffic Features for Security
    Fries, Terrence P.
    2015 IEEE 5TH SYMPOSIUM ON LARGE DATA ANALYSIS AND VISUALIZATION (LDAV), 2015, : 127 - 128
  • [44] Network security management with traffic pattern clustering
    Chiou, Tao-Wei
    Tsai, Shi-Chun
    Lin, Yi-Bing
    SOFT COMPUTING, 2014, 18 (09) : 1757 - 1770
  • [45] Mobile security agents for network traffic analysis
    Dasgupta, D
    Brian, H
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 332 - 340
  • [46] Network Traffic and Security Event Collecting System
    Son, Hee-Seung
    Lee, Jin-Heung
    Kim, Tae-Yong
    Lee, Sang-Gon
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL SYSTEMS, TECHNOLOGY AND INFORMATION 2015 (ICESTI 2015), 2016, 365 : 439 - 446
  • [47] Network security management with traffic pattern clustering
    Tao-Wei Chiou
    Shi-Chun Tsai
    Yi-Bing Lin
    Soft Computing, 2014, 18 : 1757 - 1770
  • [48] Generating realistic network traffic for security experiments
    Luo, S
    Marin, GA
    PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS, 2004, : 200 - 207
  • [49] Network traffic analysis and security monitoring with UniMon
    Erhard, W
    Gutzmann, MM
    Libati, HM
    ATM 2000: PROCEEDINGS OF THE IEEE CONFERENCE 2000 ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2000, : 439 - 446
  • [50] Manipulation of Network Traffic Traces for Security Evaluation
    Gadelrab, Mohammed
    El Kalam, Anas Abou
    Deswarte, Yves
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 1124 - +