DOI: 10.1007/978-3-540-85933-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale Network Monitoring for Visual Analysis of Attacks

Abstract: The importance of the Internet and our dependency on computer networks are steadily growing, which results in high costs and substantial consequences in case of successful intrusions, stolen data, and interrupted services. At the same time, a trend towards massive attacks against the network infrastructure is noticeable. Therefore, monitoring large networks has become an important field in practice and research. Through monitoring systems, attacks can be detected and analyzed to gain knowledge of how to better… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
43
0
1

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 58 publications
(44 citation statements)
references
References 8 publications
0
43
0
1
Order By: Relevance
“…5. Analysis of a distributed network attack on the SSH service of a university network on May 11, 2008 using NFlowVis [7]. The circles on the outside represent hosts that attack the squared hosts in the internal network.…”
Section: Network Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…5. Analysis of a distributed network attack on the SSH service of a university network on May 11, 2008 using NFlowVis [7]. The circles on the outside represent hosts that attack the squared hosts in the internal network.…”
Section: Network Securitymentioning
confidence: 99%
“…By means of the Visual Analytics application NFlowVis [7] we demonstrate in this section how the combination of automatic and visual analysis can help security experts to more efficiently derive meaning out of the vast amount of security events and traffic data, which is a characteristic of the field. In particular, we use traffic patterns, which are common for signature-based intrusion detection systems and one day of network traffic statistics (NetFlows) from the main gateway of a medium sized university, which amounts to approximately 10 GB of raw data.…”
Section: Network Securitymentioning
confidence: 99%
“…Alsaleh et al [11] designed an open source system for intrusion detection and protection for PHP-based Web applications. At present, for the network security data visualization, many methods are used, such as matrix graph, tree diagram, folding map, map, thermal map, plane coordinate, three-dimensional graphics, scatter plot and radar map [12][13][14] . This article uses the graph database to visualize the event information to facilitate the forensic analysis of the event.…”
Section: Introductionmentioning
confidence: 99%
“…Picviz [16] uses parallel coordinates to present relationships between multiple data dimensions like IP, port, packet number, TTL, and time. Treemaps [20] have been used to visualize hierarchical structures in network data, for example, in the NFlowVis system proposed by Fischer et al [3]. Scatterplots in PortVis and NVisionIP [8,10] highlight correlations between data dimensions.…”
Section: Introductionmentioning
confidence: 99%