2016 IEEE Symposium on Visualization for Cyber Security (VizSec) 2016
DOI: 10.1109/vizsec.2016.7739581
|View full text |Cite
|
Sign up to set email alerts
|

Uncovering periodic network signals of cyber attacks

Abstract: This paper addresses the problem of detecting the presence of malware that leave periodic traces in network traffic. This characteristic behavior of malware was found to be surprisingly prevalent in a parallel study. To this end, we propose a visual analytics solution that supports both automatic detection and manual inspection of periodic signals hidden in network traffic. The detected periodic signals are visually verified in an overview using a circular graph and two stacked histograms as well as in detail … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…Our work is most similar to Huynh et al [2]. They use Fourier analysis to identify periodic activity in netflow, and interactive visualization to explore alerts and temporal patterns.…”
Section: Related Workmentioning
confidence: 98%
See 4 more Smart Citations
“…Our work is most similar to Huynh et al [2]. They use Fourier analysis to identify periodic activity in netflow, and interactive visualization to explore alerts and temporal patterns.…”
Section: Related Workmentioning
confidence: 98%
“…In the case of applying our periodicity detection algorithm to netflow logs for the purpose of identifying unexpected automated behavior, we define an entity to be the 4-tuple (Source IP, Destination IP, Protocol, Destination Port), and the time series of interest to be the total number of bytes transferred during the flow initiated in the given time bin, with these values being aggregated over time bins by taking the sum (that is, agg = sum for this use case). Note that while flows are often analyzed at the level of the 5-tuple including Source Port (as in [2], for example), we have found that aggregating over all source ports is useful in detecting meaningful automated activity, as source ports for automated activity often differ with each connection. Alternative entity definitions that we have experimented with for netflow analysis include replacing Source and Destination IPs with Company ASNs (to account for automated activity to/from a given range of IPs where the individual IP varies over time), replacing Destination port with min(Source Port, Destination Port) to better…”
Section: Entity Definitionmentioning
confidence: 99%
See 3 more Smart Citations