A Unified Approach to Network Traffic and Network Security Visualisation

被引:0
|
作者
Read, Huw [1 ]
Blyth, Andrew [1 ]
Sutherland, Iain [1 ]
机构
[1] Univ Glamorgan, Fac Adv Technol, Pontypridd CF37 1DL, M Glam, Wales
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we present an architecture which enables data-sharing between computer security and network traffic visualisation tools. At its core is a middleware which manages all interactions. This enables one application to determine the acceptable input for another, and send compatible data. The middleware sits atop a unified database which provides data in a generic form to the applications. Interesting traffic patterns or attack trends seen in one tool can be sent directly to another for further examination and analysis. All communication in the middleware is performed using XML as a data transport mechanism.
引用
收藏
页码:614 / 619
页数:6
相关论文
共 50 条
  • [1] Network Security: Approach Based on Network Traffic Prediction
    Thakare, Sheetal
    Pund, Anshuman
    Pund, M. A.
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 41 - 55
  • [2] Wireless mesh network security: A traffic engineering management approach
    Muogilim, Okechukwu E.
    Loo, Kok-Keong
    Comley, Richard
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (02) : 478 - 491
  • [3] An Exploration of Geolocation and Traffic Visualisation Using Network Flows
    Pennefather, Sean
    Irwin, Barry
    [J]. 2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,
  • [4] Towards Steganography Detection Through Network Traffic Visualisation
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    Jankowski, Bartosz
    [J]. IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 947 - 954
  • [5] Multi-Resolution Visualisation of Geographic Network Traffic
    Kaya, Berkay
    Balcisoy, Selim
    [J]. Augmented Reality, Virtual Reality, and Computer Graphics, Pt I, 2016, 9768 : 52 - 71
  • [6] Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
    Blake, Errol A.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (04) : 77 - 106
  • [7] PhD Forum: A System Identification Approach to Monitoring Network Traffic Security
    Mayo, Quentin
    Bryce, Renee
    Dantu, Ram
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 509 - 511
  • [8] Traffic Management and Security in Wired Network
    Dhaka, Shivali
    [J]. INFORMATION, COMMUNICATION AND COMPUTING TECHNOLOGY, ICICCT 2018, 2019, 835 : 17 - 30
  • [9] Network Traffic Classification for Security Analysis
    Boger, Mark
    Liu, Tianyuan
    Ratliff, Jacqueline
    Nick, William
    Yuan, Xiaohong
    Esterline, Albert
    [J]. SOUTHEASTCON 2016, 2016,
  • [10] Security by Simple Network Traffic Monitoring
    Tsunoda, Hiroshi
    Keeni, Glenn Mansfield
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 201 - 204