学位论文详细信息
Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks
Intrusion detection;Alarm visualization;Network security visualization;Network security;Port visualization;Network visualization
Abdullah, Kulsoom B. ; Engineering Electrical and Computer Engineering
University:Georgia Institute of Technology
Department:Engineering
关键词: Intrusion detection;    Alarm visualization;    Network security visualization;    Network security;    Port visualization;    Network visualization;   
Others  :  https://smartech.gatech.edu/bitstream/1853/10509/1/abdullah_kulsoom_b_200605_phd.pdf
美国|英语
来源: SMARTech Repository
PDF
【 摘 要 】

As the trend of successful network attacks continue to rise, better forms of intrusion, detection and prevention are needed.This thesis addresses network traffic visualization techniques that aid administrators in recognizing attacks. A view of port statistics and Intrusion Detection System (IDS) alerts has been developed.Each help to address issues with analyzing large datasets involving networks. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary.A port-based overview of network activity produces an improved representation for detecting and responding to malicious activity. We have found that presenting an overview using stacked histograms of aggregate port activity, combined with the ability to drill-down for finer details allows small, yet important details to be noticed and investigated without being obscured by large, usual traffic. Another problem administrators face is the cumbersome amount of alarm data generated from IDS sensors.As a result, important details are often overlooked, and it is difficult to get an overall picture of what is occurring in the network by manually traversing textual alarm logs. We have designed a novel visualization to address this problem by showing alarm activity within a network.Alarm data is presented in an overview from which system administrators can get a general sense of network activity and easily detect anomalies.They additionally have the option of then zooming and drilling down for details.Based on our system administrator requirements study, this graphical layout addresses what system administrators need to see, is faster and easier than analyzing text logs, and uses visualization techniques to effectively scale and display the data.With this design, we have built a tool that effectively uses operational alarm log data generated on the Georgia Tech campus network.For both of these systems, we describe the input data, the system design, and examples.Finally, we summarize potential future work.

【 预 览 】
附件列表
Files Size Format View
Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks 3777KB PDF download
  文献评价指标  
  下载次数:13次 浏览次数:56次