A Unified Approach to Network Traffic and Network Security Visualisation

被引:0
|
作者
Read, Huw [1 ]
Blyth, Andrew [1 ]
Sutherland, Iain [1 ]
机构
[1] Univ Glamorgan, Fac Adv Technol, Pontypridd CF37 1DL, M Glam, Wales
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we present an architecture which enables data-sharing between computer security and network traffic visualisation tools. At its core is a middleware which manages all interactions. This enables one application to determine the acceptable input for another, and send compatible data. The middleware sits atop a unified database which provides data in a generic form to the applications. Interesting traffic patterns or attack trends seen in one tool can be sent directly to another for further examination and analysis. All communication in the middleware is performed using XML as a data transport mechanism.
引用
收藏
页码:614 / 619
页数:6
相关论文
共 50 条
  • [21] A unified monitoring framework for energy consumption and network traffic
    Clouet, Florentin
    Delamare, Simon
    Gelas, Jean-Patrick
    Lefèvre, Laurent
    Nussbaum, Lucas
    Parisot, Clément
    Pouilloux, Laurent
    Rossigneux, François
    [J]. EAI Endorsed Transactions on Energy Web, 2015, 15 (04) : 1 - 10
  • [22] A unified approach to network location problems
    Nickel, S
    Puerto, J
    [J]. NETWORKS, 1999, 34 (04) : 283 - 290
  • [23] Approach of the security of enterprises' network
    Zheng, Y.-H.
    [J]. Huadong Chuanbo Gongye Xueyuan Xuebao/Journal of East China Shipbuilding Institute, 2001, 15 (05): : 32 - 36
  • [24] A Comprehensive Approach for Network Security
    Rm, Manikandan
    Radha, D.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426
  • [25] Improving network security by multipath traffic dispersion
    Yang, J
    Papavasiliou, S
    [J]. 2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 34 - 38
  • [26] Security Evaluation of Hosts Based on Network Traffic
    Gao, Cuixia
    Li, Zhitang
    Chen, Lin
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 901 - 905
  • [27] Network security management with traffic pattern clustering
    Chiou, Tao-Wei
    Tsai, Shi-Chun
    Lin, Yi-Bing
    [J]. SOFT COMPUTING, 2014, 18 (09) : 1757 - 1770
  • [28] Fuzzy Clustering of Network Traffic Features for Security
    Fries, Terrence P.
    [J]. 2015 IEEE 5TH SYMPOSIUM ON LARGE DATA ANALYSIS AND VISUALIZATION (LDAV), 2015, : 127 - 128
  • [29] Mobile security agents for network traffic analysis
    Dasgupta, D
    Brian, H
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 332 - 340
  • [30] Network security management with traffic pattern clustering
    Tao-Wei Chiou
    Shi-Chun Tsai
    Yi-Bing Lin
    [J]. Soft Computing, 2014, 18 : 1757 - 1770