Situ: Identifying and Explaining Suspicious Behavior in Networks

被引:39
|
作者
Goodall, John R. [1 ]
Ragan, Eric D. [2 ]
Steed, Chad A. [1 ]
Reed, Joel W. [1 ]
Richardson, G. David [1 ]
Huffer, Kelly M. T. [1 ]
Bridges, Robert A. [1 ]
Laska, Jason A. [1 ]
机构
[1] Oak Ridge Natl Lab, Oak Ridge, TN 37830 USA
[2] Univ Florida, Gainesville, FL 32611 USA
关键词
Network security; situational awareness; privacy and security; streaming data; machine learning; visualization;
D O I
10.1109/TVCG.2018.2865029
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets, and major financial damages. Anomaly detection methods are beneficial for detecting new types of attacks and abnormal network activity, but such algorithms can be difficult to understand and trust. Network operators and cyber analysts need fast and scalable tools to help identify suspicious behavior that bypasses automated security systems, but operators do not want another automated tool with algorithms they do not trust. Experts need tools to augment their own domain expertise and to provide a contextual understanding of suspicious behavior to help them make decisions. In this paper we present Situ, a visual analytics system for discovering suspicious behavior in streaming network data. Situ provides a scalable solution that combines anomaly detection with information visualization. The system's visualizations enable operators to identify and investigate the most anomalous events and IP addresses, and the tool provides context to help operators understand why they are anomalous. Finally; operators need tools that can be integrated into their workflow and with their existing tools. This paper describes the Situ platform and its deployment in an operational network setting. We discuss how operators are currently using the tool in a large organization's security operations center and present the results of expert reviews with professionals.
引用
收藏
页码:204 / 214
页数:11
相关论文
共 50 条
  • [1] Identifying and explaining resilience in ecological networks
    Jeynes-Smith, Cailan
    Bode, Michael
    Araujo, Robyn P.
    ECOLOGY LETTERS, 2024, 27 (08)
  • [2] Discovering suspicious behavior in multilayer social networks
    Bindu, P. V.
    Thilagam, P. Santhi
    Ahuja, Deepesh
    COMPUTERS IN HUMAN BEHAVIOR, 2017, 73 : 568 - 582
  • [3] Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis
    Barbosa, Kaio R. S.
    Souto, Eduardo
    Feitosa, Eduardo
    El-Khatib, Khalil
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 160 - 167
  • [4] Visual Integration of Meteorological and Sensor Data for Identifying Suspicious Company Behavior
    Seebacher, Daniel
    Schneider, Bruno
    Behrisch, Michael
    2017 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2017, : 225 - 226
  • [6] Visual Analysis of Implicit Social Networks for Suspicious Behavior Detection
    Bennamane, Amyn
    Hacid, Hakim
    Ansiaux, Arnaud
    Cagnati, Alain
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT II, 2011, 6588 : 388 - +
  • [7] Identifying suspicious regions in optical coherence tomography angiography using convolutional neural networks
    Leahy, Conor
    Perez, Thomas
    Durbin, Mary K.
    Kashani, Amir H.
    Murata, Toshinori
    Shemonski, Nathan
    INVESTIGATIVE OPHTHALMOLOGY & VISUAL SCIENCE, 2018, 59 (09)
  • [8] Explaining the Behavior of Neuron Activations in Deep Neural Networks
    Wang, Longwei
    Wang, Chengfei
    Li, Yupeng
    Wang, Rui
    AD HOC NETWORKS, 2021, 111
  • [9] Detecting Suspicious Following Behavior in Multimillion-Node Social Networks
    Jiang, Meng
    Cui, Peng
    Beutel, Alex
    Faloutsos, Christos
    Yang, Shiqiang
    WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, : 305 - 306
  • [10] Identifying suspicious addresses in Bitcoin thefts
    Wu, Yan
    Luo, Anthony
    Xu, Dianxiang
    DIGITAL INVESTIGATION, 2019, 31