PACKTER: implementation of internet traffic visualizer and extension for network forensics

被引:0
|
作者
Miyamoto, Daisuke [1 ]
Iimura, Takuji [1 ]
机构
[1] Univ Tokyo, Ctr Informat Technol, Project PACKTER, Bunkyo Ku, Tokyo 1138658, Japan
关键词
Network forensic; IP traceback; Traffic visualization;
D O I
10.1007/s00607-013-0289-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traffic visualization tools help network operators to maintain awareness of the status of a network, including anomalous activities. Unfortunately, the network operator may look away from the visualizer when beginning network forensics, such as launching a terminal application, logging into a server, and analyzing log files. Thus, the eyesight of the network operator will move from the visual screen even if valuable information is displayed. Our motivation is to develop the ability to use visualization tools as a network operation console. Whereas previous tools focused on outputting packet information, we herein extend the visualizer to accept inputting for operators to start their operations. Since little such software exists for our intent, we develop PACKTER, which is able to visualize traffic based on per-packet information in real time. We also extend PACKTER to have a function of negotiating to a network forensic system, which allows the operator to select an individual packet using a mouse, to start network forensics using a keyboard, and to receive results without looking away from the PACKTER viewer.
引用
收藏
页码:79 / 80
页数:2
相关论文
共 50 条
  • [1] PACKTER: implementation of internet traffic visualizer and extension for network forensics
    Daisuke Miyamoto
    Takuji Iimura
    [J]. Computing, 2014, 96 : 79 - 80
  • [2] Design and implementation of an Internet QoS visualizer
    [J]. Fukuda, Harumoto, 2000, Scripta Technica Inc, New York, NY, United States (83):
  • [3] Design and implementation of an Internet QoS visualizer
    Fukuda, H
    Ono, S
    Takahashi, N
    [J]. ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS, 2000, 83 (01): : 44 - 52
  • [4] Trusted Internet Forensics: design of a network forensics appliance
    Bruschi, D.
    Monga, M.
    Rosti, E.
    [J]. 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 35 - 37
  • [5] Characterising Network Traffic for Skype Forensics
    Azab, Ahmad
    Watters, Paul
    Layton, Robert
    [J]. 2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 19 - 27
  • [6] Active traffic capture for network forensics
    Slaviero, Marco
    Granova, Anna
    Olivier, Martin
    [J]. ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 215 - +
  • [7] TRAFFIC CLASSIFICATION AND APPLICATION IDENTIFICATION IN NETWORK FORENSICS
    Pluskal, Jan
    Lichtner, Ondrej
    Rysavy, Ondrej
    [J]. ADVANCES IN DIGITAL FORENSICS XIV, 2018, 532 : 161 - 181
  • [8] Network Forensics for Encrypted SCADA Device Programming Traffic
    Mellish, Robert
    Graham, Scott
    Dunlap, Stephen
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 465 - 472
  • [9] Hviz: HTTP(S) traffic aggregation and visualization for network forensics
    Gugelmann, David
    Gasser, Fabian
    Ager, Bernhard
    Lenders, Vincent
    [J]. DIGITAL INVESTIGATION, 2015, 12 : S1 - S11
  • [10] EXTENSION OF A VARIATIONAL METHOD TO TRAFFIC NETWORK
    Tao, Y. Z.
    [J]. TRANSPORTATION AND URBAN SUSTAINABILITY, 2010, : 307 - 313