A Novel Radial Visualization of Intrusion Detection Alerts

被引:13
|
作者
Shi, Yang [1 ,2 ]
Zhao, Ying [3 ]
Zhou, Fangfang [3 ]
Shi, Ronghua [3 ]
Zhang, Yaoxue [4 ]
Wang, Guojun [5 ]
机构
[1] Cent S Univ, Changsha, Hunan, Peoples R China
[2] Tongji Univ, Intelligent Big Data Visualiat Lab, Shanghai, Peoples R China
[3] Cent S Univ, Sch Informat Sci & Engn, Changsha, Hunan, Peoples R China
[4] Cent S Univ, Dept Comp Sci, Changsha, Hunan, Peoples R China
[5] Guangzhou Univ, Guangzhou, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/MCG.2018.2879067
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Intrusion detection systems (IDSs) generally produce an overwhelming amount of alerts, which are commonly plagued by issues of false positives. It is cumbersome for network administrators to manually traverse text-based alert logs in order to detect threats. In this work, we present a novel radial visualization of IDSs alerts, IDSPlanet, which helps administrators identify false positives, analyze attack patterns, and understand evolving network situations. Using a planet's geology as a metaphor for the design. IDSPlanet is composed of chrono rings, alert continents, and an interactive core. Accordingly, these components encode the temporal features of alert types, patterns of behavior in affected hosts, and correlations amongst alert types. attackers, and targets, respectively. The visualization provides an informative picture of networks' status. IDSPlanet offers different interactions and monitoring modes, which allow users to investigate in detail as well as to explore overall pattern. Two case studies and two interviews were conducted to demonstrate the usability and effectiveness of our visualization design.
引用
收藏
页码:83 / 95
页数:13
相关论文
共 50 条
  • [1] AlertWheel: Radial Bipartite Graph Visualization Applied to Intrusion Detection System Alerts
    Dumas, Maxime
    Robert, Jean-Marc
    McGuffin, Michael J.
    [J]. IEEE NETWORK, 2012, 26 (06): : 12 - 18
  • [2] Critical episode mining in intrusion detection alerts
    Soleimani, Mahboobeh
    Ghorbani, Ali A.
    [J]. CNSR 2008: PROCEEDINGS OF THE 6TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2008, : 157 - 164
  • [3] Improving the Quality of Alerts with Correlation in Intrusion Detection
    Salim, Lalla Fatima
    Mezrioui, Abdellatif
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 210 - 215
  • [4] Modeling network intrusion detection alerts for correlation
    Zhou, Jingmin
    Heckman, Mark
    Reynolds, Brennen
    Carlson, Adam
    Bishop, Matt
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (01)
  • [5] Classification of intrusion detection alerts using abstaining classifiers
    Pietraszek, Tadeusz
    [J]. INTELLIGENT DATA ANALYSIS, 2007, 11 (03) : 293 - 316
  • [6] Deep Learning for Prioritizing and Responding to Intrusion Detection Alerts
    McElwee, Steven
    Heaton, Jeffrey
    Fraley, James
    Cannady, James
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 1 - 5
  • [7] Analysis and Prediction of Alerts in Perimeter Intrusion Detection System
    Aggarwal, Rizul
    Goswami, Anjali
    Kumar, Jitender
    Chullai, G. A.
    [J]. DEFENCE SCIENCE JOURNAL, 2020, 70 (06) : 619 - 625
  • [8] Managing alerts in a multi-intrusion detection environment
    Cuppens, F
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 22 - 31
  • [9] Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection
    Mallissery, Sanoop
    Praveen, K.
    Sathar, Shahana
    [J]. COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 662 - +
  • [10] Dataset of intrusion detection alerts from a sharing platform
    Husak, Martin
    Zadnik, Martin
    Bartos, Vaclav
    Sokol, Pavol
    [J]. DATA IN BRIEF, 2020, 33