[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1850795.1850802acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvizsecConference Proceedingsconference-collections
research-article

Visualizing host traffic through graphs

Published: 14 September 2010 Publication History

Abstract

Gaining an overview of host activities is hard when a host is busily exchanging hundreds or thousands of flows over a network. This makes investigating traffic of a suspicious host a tedious task for a security analyst. We propose a novel host traffic visualization technique that reduces this cognitive burden by i) representing traffic through an annotated k-partite graph reflecting familiar Berkeley socket model semantics, ii) employing a host role summarization for effective removal of ephemeral traffic features, and iii) providing classification and filtering techniques for unwanted traffic, which are important for identifying the functional role of port numbers and for visualization. We present the open-source tool HAPviewer and demonstrate how it can visualize a large number of flows through a compact and easily interpretable graph.

References

[1]
Barrera D, van Oorschot PC 2009. Security Visualization Tools and IPv6 Addresses. Workshop on Visualization for Cyber security, Atlantic City, NJ USA (VizSec 2009).
[2]
Emden R. Gansner, Eleftherios Koutsofios, Stephen C. North, and Kiem-Phong Vo. A Technique for Drawing Directed Graphs. IEEE Trans. Sofware Eng., 19(3):214--230, May 1993.
[3]
Fan, J, Xu, J, Ammar, MH, and Moon, SB. 2004. Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. Computer Networks 46, 2 (7 Oct. 04), 253--272, Elsevier.
[4]
Glanfield J, Brooks S, Taylor T et al. 2009. OverFlow: An Overview Visualization for Network Analysis. Workshop on Visualization for Cyber Security (VizSec 2009).
[5]
Fink, G., Endert, A. 2009. Visualizing Cyber Security: Usable Workspaces. Workshop on Visualization for Cyber Security (VizSec 2009).
[6]
Haag, P. 2005. Watch your Flows with NfSen and NfDump. 50th RIPE Meeting (3 May 05, Stockholm).
[7]
Iliofotou, M, Pappu, P, Faloutsos, M, Mitzenmacher, M, Singh, S, and Varghese, G. 2007. Network monitoring using traffic dispersion graphs (tdgs). In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. ACM New York, NY.
[8]
Karagiannis, T, Papagiannaki, K, and Faloutsos, M. 2005. BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Computer Communication Review. ACM Press New York, NY.
[9]
Karagiannis, T, Papagiannaki, K, Taft, N, and Faloutsos, M. 2007. Profiling the End Host. Passive and Active Measurement Conference (PAM), Louvain-la-neuve, Belgium, April 2007. SPRINGER-VERLAG.
[10]
Mansmann F, Fischer F, Keim DA, North SC 2009. Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations. New York, NY, USA: ACM.
[11]
Yi, JS, Kang, Y, Stasko, JT, and Jacko, JA. 2008. Understanding and characterizing insights: how do people gain insights using information visualization? In Proceedings of the 2008 conference on BEyond time and errors: novel evaLuation methods for Information Visualization (Florence, Italy, 5 April 08). BELIV'08. ACM, New York, NY.
[12]
Yin, X., Yurcik, W., Li, Y., Lakkaraju, K. and Abad, C. 2004. Visflowconnect: Providing security situational awareness by visualizing network traffic flows. Performance Computing and Communications, IEEE International Conference o, pages 601--607, 2004
[13]
Xforce (IBM Internet Security Systems), Vulnerability ID 16244, Dabber worm detected. http://xforce.iss.net/xforce/xfdb/16244

Cited By

View all
  • (2024)A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack DetectionIEEE Access10.1109/ACCESS.2024.341906812(89363-89383)Online publication date: 2024
  • (2018)Practical firewall policy inspection using anomaly detection and its visualizationMultimedia Tools and Applications10.1007/s11042-013-1673-871:2(627-641)Online publication date: 31-Dec-2018
  • (2018)Visualizing big network traffic data using frequent pattern mining and hypergraphsComputing10.1007/s00607-013-0282-896:1(27-38)Online publication date: 31-Dec-2018
  • Show More Cited By

Index Terms

  1. Visualizing host traffic through graphs

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    VizSec '10: Proceedings of the Seventh International Symposium on Visualization for Cyber Security
    September 2010
    123 pages
    ISBN:9781450300131
    DOI:10.1145/1850795
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 September 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. information visualization
    2. network
    3. security

    Qualifiers

    • Research-article

    Conference

    VizSec '10

    Acceptance Rates

    VizSec '10 Paper Acceptance Rate 12 of 27 submissions, 44%;
    Overall Acceptance Rate 39 of 111 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack DetectionIEEE Access10.1109/ACCESS.2024.341906812(89363-89383)Online publication date: 2024
    • (2018)Practical firewall policy inspection using anomaly detection and its visualizationMultimedia Tools and Applications10.1007/s11042-013-1673-871:2(627-641)Online publication date: 31-Dec-2018
    • (2018)Visualizing big network traffic data using frequent pattern mining and hypergraphsComputing10.1007/s00607-013-0282-896:1(27-38)Online publication date: 31-Dec-2018
    • (2016)A Survey on Information Visualization for Network and Service ManagementIEEE Communications Surveys & Tutorials10.1109/COMST.2015.245053818:1(285-323)Online publication date: Sep-2017
    • (2014)DAVASTProceedings of the Eleventh Workshop on Visualization for Cyber Security10.1145/2671491.2671499(25-32)Online publication date: 10-Nov-2014
    • (2011)Practical Firewall Policy Inspection Using Anomaly Detection and Its VisualizationProceedings of the International Conference on IT Convergence and Security 201110.1007/978-94-007-2911-7_61(629-639)Online publication date: 7-Dec-2011

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media