Situ: Identifying and Explaining Suspicious Behavior in Networks

被引:39
|
作者
Goodall, John R. [1 ]
Ragan, Eric D. [2 ]
Steed, Chad A. [1 ]
Reed, Joel W. [1 ]
Richardson, G. David [1 ]
Huffer, Kelly M. T. [1 ]
Bridges, Robert A. [1 ]
Laska, Jason A. [1 ]
机构
[1] Oak Ridge Natl Lab, Oak Ridge, TN 37830 USA
[2] Univ Florida, Gainesville, FL 32611 USA
关键词
Network security; situational awareness; privacy and security; streaming data; machine learning; visualization;
D O I
10.1109/TVCG.2018.2865029
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets, and major financial damages. Anomaly detection methods are beneficial for detecting new types of attacks and abnormal network activity, but such algorithms can be difficult to understand and trust. Network operators and cyber analysts need fast and scalable tools to help identify suspicious behavior that bypasses automated security systems, but operators do not want another automated tool with algorithms they do not trust. Experts need tools to augment their own domain expertise and to provide a contextual understanding of suspicious behavior to help them make decisions. In this paper we present Situ, a visual analytics system for discovering suspicious behavior in streaming network data. Situ provides a scalable solution that combines anomaly detection with information visualization. The system's visualizations enable operators to identify and investigate the most anomalous events and IP addresses, and the tool provides context to help operators understand why they are anomalous. Finally; operators need tools that can be integrated into their workflow and with their existing tools. This paper describes the Situ platform and its deployment in an operational network setting. We discuss how operators are currently using the tool in a large organization's security operations center and present the results of expert reviews with professionals.
引用
收藏
页码:204 / 214
页数:11
相关论文
共 50 条
  • [41] ASPECT® - Analysing Suspicious Persons and Cognitive Training Recognition of suspicious Behavior and suspicion Situations
    Baettig, Franz
    Frey, Corinne
    Hofer, Franziska
    KRIMINALISTIK, 2011, 65 (10): : 641 - 647
  • [42] A logical framework for identifying and explaining unexpected news
    Byrne, Emma
    COMPUTING AND INFORMATICS, 2006, 25 (2-3) : 127 - 152
  • [43] SimiDroid: Identifying and Explaining Similarities in Android Apps
    Li, Li
    Bissyande, Tegawende F.
    Klein, Jacques
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 136 - 143
  • [44] Identifying and explaining epochs of internationalization: a case study
    Eckert, Stefan
    Mayrhofer, Ulrike
    EUROPEAN MANAGEMENT REVIEW, 2005, 2 (03) : 212 - 223
  • [45] Detecting suspicious entities in Offshore Leaks networks
    Mikel Joaristi
    Edoardo Serra
    Francesca Spezzano
    Social Network Analysis and Mining, 2019, 9
  • [46] Detecting suspicious entities in Offshore Leaks networks
    Joaristi, Mikel
    Serra, Edoardo
    Spezzano, Francesca
    SOCIAL NETWORK ANALYSIS AND MINING, 2019, 9 (01)
  • [47] Polysulfide networks. In situ formation and characterization of the elastomeric behavior
    Kilcher, Giona
    Wang, Lei
    Duckham, Craig
    Tirelli, Nicola
    MACROMOLECULES, 2007, 40 (14) : 5141 - 5149
  • [48] Malware Detection Based on Suspicious Behavior Identification
    Wang, Cheng
    Pang, Jianmin
    Zhao, Rongcai
    Fu, Wen
    Liu, Xiaoxian
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 198 - 202
  • [49] Incremental behavior modeling and suspicious activity detection
    Ouivirach, Kan
    Gharti, Shashi
    Dailey, Matthew N.
    PATTERN RECOGNITION, 2013, 46 (03) : 671 - 680
  • [50] Suspicious behavior detection based on DECOC classifier
    Ben Ayed, Mossaad
    Abid, Mohamed
    2017 18TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL AND COMPUTER ENGINEERING (STA), 2017, : 594 - 598