2013 IEEE International Conference on Communications (ICC) 2013
DOI: 10.1109/icc.2013.6654828
|View full text |Cite
|
Sign up to set email alerts
|

P3D: A parallel 3D coordinate visualization for advanced network scans

Abstract: As network attacks increase in complexity, network administrators will continue to struggle with analyzing security data immediately and efficiently. To alleviate these challenges, researchers are looking into various visualization techniques (e.g., two-dimensional (2D) and three-dimensional (3D)) to detect, identify, and analyze malicious attacks. This paper discusses the benefits of using a stereoscopic 3D parallel visualization techniques for network scanning, in particular, when addressing occlusion-based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
8
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 19 publications
1
8
0
Order By: Relevance
“…As already introduced, one plane represents the source IP address and port of the packet and the second plane represents the destination IP address and the port of the packets. This 3D visualisation is similar to the technique proposed by Nunnally et al [20]. Before any processing, the result is similar to Figure 3(a).…”
Section: E Implementation Detailssupporting
confidence: 82%
See 1 more Smart Citation
“…As already introduced, one plane represents the source IP address and port of the packet and the second plane represents the destination IP address and the port of the packets. This 3D visualisation is similar to the technique proposed by Nunnally et al [20]. Before any processing, the result is similar to Figure 3(a).…”
Section: E Implementation Detailssupporting
confidence: 82%
“…Figure 4 is the result of this scan analysis with more data than Figure 3(a). Since the packets marked as noise by the clustering are not drawn, the result is much more understandable than a raw visualisation as proposed by Nunnally and al [20] and depicted in Figure 3(a). Slices of scans are clearly visible where multiple IP addresses of our darknet are being targeted.…”
Section: B Topologies Of Scanning Activitiesmentioning
confidence: 82%
“…Nunnally et al [144] propose a visualization tool called P3D that uses 3D parallel visualization techniques to help network administrators in identifying and analyzing distributed scanning attacks that aim to distract them. P3D is based on a 3D coordinate system with colored links between two Figure 13.…”
Section: B State Of the Artmentioning
confidence: 99%
“…(a) The visualization proposed by Zhao[140]; (b) An overview of DAEDALUS-VIZ[143]; (c) An example of source port confusion attack represented by P3D visualization[144].…”
mentioning
confidence: 99%
“…This technology can make problems quickly and precisely positioned via interactions. Three-dimensional effect has been also introduced to display network activities [21], [22]. However, depth information that is hard to handle makes interactions difficult and mutual occlusions unavoidable.…”
Section: B Network Traffic Visualizationmentioning
confidence: 99%