A visualization paradigm for network intrusion detection

被引:38
|
作者
Livnat, Y [1 ]
Agutter, J [1 ]
Moon, S [1 ]
Erbacher, RF [1 ]
Foresti, S [1 ]
机构
[1] Univ Utah, Sci Comp & Imaging Inst, Salt Lake City, UT 84112 USA
关键词
D O I
10.1109/IAW.2005.1495939
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a novel paradigm for visual correlation of network alerts from disparate logs. This paradigm facilitates and promotes situational awareness in complex network environments. Our approach is based on the notion that, by definition, an alert must posses three attributes, namely: What, When, and Where. This fundamental premise, which we term omega(3), provides a vehicle for comparing between seemingly disparate events. We propose a concise and scalable representation of these three attributes, that leads to a flexible visualization tool that is also clear and intuitive to use. Within our system, alerts can be grouped and viewed hierarchically with respect to both their type, i.e., the What, and to their Where attributes. Further understanding is gained by displaying the temporal distribution of alerts to reveal complex attack trends. Finally, we propose a set of visual metaphor extensions that augment the proposed paradigm and enhance users' situational awareness. These metaphors direct the attention of users to many-to-one correlations within the current display helping them detect abnormal network activity.
引用
收藏
页码:92 / 99
页数:8
相关论文
共 50 条
  • [41] Markov chains in network intrusion detection
    Hixon, R
    Gruenbacher, DA
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 432 - 433
  • [42] Integrating intrusion detection and network management
    Qin, XH
    Lee, W
    Lewis, L
    Cabrera, JBD
    NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 329 - 344
  • [43] Deep Stacking Network for Intrusion Detection
    Tang, Yifan
    Gu, Lize
    Wang, Leiting
    SENSORS, 2022, 22 (01)
  • [44] Research on Network Intrusion Detection System
    Xu, Jiang
    Cao, Zhongwei
    MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 77 - +
  • [45] Neural network ensembles for intrusion detection
    Golovko, Vladimir
    Kachurka, Pavel
    Vaitsekhovich, Leanid
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 578 - 583
  • [46] Improving the Speed of the Network Intrusion Detection
    Sadeghi, Zahra
    Bahrami, Asadollah Shah
    2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2013, : 88 - 91
  • [47] Analysis of Autoencoders for Network Intrusion Detection
    Song, Youngrok
    Hyun, Sangwon
    Cheong, Yun-Gyung
    SENSORS, 2021, 21 (13)
  • [48] A Sequential Approach to Network Intrusion Detection
    Lee, Nicholas
    Ooi, Shih Yin
    Pang, Ying Han
    COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 : 11 - 21
  • [49] Developing expertise for network intrusion detection
    Goodall, John R.
    Lutters, Wayne G.
    Komlodi, Anita
    INFORMATION TECHNOLOGY & PEOPLE, 2009, 22 (02) : 92 - 108
  • [50] Fuzzy network profiling for intrusion detection
    Dickerson, JE
    Dickerson, JA
    PEACHFUZZ 2000 : 19TH INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS, 2000, : 301 - 306