Situ: Identifying and Explaining Suspicious Behavior in Networks

被引:39
|
作者
Goodall, John R. [1 ]
Ragan, Eric D. [2 ]
Steed, Chad A. [1 ]
Reed, Joel W. [1 ]
Richardson, G. David [1 ]
Huffer, Kelly M. T. [1 ]
Bridges, Robert A. [1 ]
Laska, Jason A. [1 ]
机构
[1] Oak Ridge Natl Lab, Oak Ridge, TN 37830 USA
[2] Univ Florida, Gainesville, FL 32611 USA
关键词
Network security; situational awareness; privacy and security; streaming data; machine learning; visualization;
D O I
10.1109/TVCG.2018.2865029
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets, and major financial damages. Anomaly detection methods are beneficial for detecting new types of attacks and abnormal network activity, but such algorithms can be difficult to understand and trust. Network operators and cyber analysts need fast and scalable tools to help identify suspicious behavior that bypasses automated security systems, but operators do not want another automated tool with algorithms they do not trust. Experts need tools to augment their own domain expertise and to provide a contextual understanding of suspicious behavior to help them make decisions. In this paper we present Situ, a visual analytics system for discovering suspicious behavior in streaming network data. Situ provides a scalable solution that combines anomaly detection with information visualization. The system's visualizations enable operators to identify and investigate the most anomalous events and IP addresses, and the tool provides context to help operators understand why they are anomalous. Finally; operators need tools that can be integrated into their workflow and with their existing tools. This paper describes the Situ platform and its deployment in an operational network setting. We discuss how operators are currently using the tool in a large organization's security operations center and present the results of expert reviews with professionals.
引用
收藏
页码:204 / 214
页数:11
相关论文
共 50 条
  • [31] MORE ON FAITHFUL BEHAVIOR OF SUSPICIOUS SUBJECTS
    FILLENBA.S
    FREY, R
    JOURNAL OF PERSONALITY, 1970, 38 (01) : 43 - &
  • [32] Analysis of Online Suspicious Behavior Patterns
    Deshpande, Dhanashree
    Deshpande, Shrinivas
    Thakare, Vilas
    AMBIENT COMMUNICATIONS AND COMPUTER SYSTEMS, RACCCS 2017, 2018, 696 : 485 - 495
  • [33] Theory of Mind and the Detection of Suspicious Behavior
    Brewer, Neil
    Ying, Audrey Bay Wei
    Young, Robyn L.
    Nah, Yong-Hwee
    JOURNAL OF APPLIED RESEARCH IN MEMORY AND COGNITION, 2018, 7 (01) : 123 - 131
  • [34] Novel approach for explaining the behavior of trained artificial neural networks with distributed representations
    Zhou, Yuan-hui
    Lu, Yu-chang
    Shi, Chun-yi
    Chinese Journal of Advanced Software Research, 1999, 6 (01): : 49 - 60
  • [35] ToRank: Identifying the most influential suspicious domains in the Tor network
    Al-Nabki, Mhd Wesam
    Fidalgo, Eduardo
    Alegre, Enrique
    Fernandez-Robles, Laura
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 123 : 212 - 226
  • [36] EXPLAINING BEHAVIOR OF ENTITIES
    FINE, AI
    PHILOSOPHICAL REVIEW, 1966, 75 (04): : 496 - 509
  • [37] EXPLAINING INSECT BEHAVIOR
    TAVOLGA, WN
    SCIENCE, 1964, 144 (362) : 1533 - &
  • [38] EXPLAINING COMPUTER BEHAVIOR
    MOOR, JH
    PHILOSOPHICAL STUDIES, 1978, 34 (03) : 325 - 327
  • [39] EXPLAINING HUMAN BEHAVIOR
    GLOSSOP, RJ
    PHILOSOPHY AND PHENOMENOLOGICAL RESEARCH, 1970, 30 (03) : 444 - 449
  • [40] Identifying suspicious activities through DNS failure graph analysis
    Computer Science Dept., University of Minnesota, United States
    不详
    Proc. Int. Conf. Netw. Protoc. ICNP, (144-153):