VisTracer : a visual analytics tool to investigate routing anomalies in traceroutes

dc.contributor.authorFischer, Fabian
dc.contributor.authorFuchs, Johannes
dc.contributor.authorVervier, Pierre-Antoinedeu
dc.contributor.authorMansmann, Florian
dc.contributor.authorThonnard, Olivierdeu
dc.date.accessioned2013-03-01T14:29:46Zdeu
dc.date.available2013-03-01T14:29:46Zdeu
dc.date.issued2012
dc.description.abstractRouting in the Internet is vulnerable to attacks due to the insecure design of the border gateway protocol (BGP). One possible exploitation of this insecure design is the hijacking of IP blocks. Such hijacked IP blocks can then be used to conduct malicious activities from seemingly legitimate IP addresses. In this study we actively trace and monitor the routes to spam sources over several consecutive days after having received a spam message from such a source. However, the real challenge is to distinguish between legitimate routing changes and those ones that are related to systematic misuse in so-called spam campaigns. To combine the strengths of human judgement and computational efficiency, we thus present a novel visual analytics tool named Vistracer in this paper. This tool represents analysis results of our anomaly detection algorithms on large traceroute data sets with the help of several scalable representations to support the analyst to explore, identify and analyze suspicious events and their relations to malicious activities. In particular, pixel-based visualization techniques, novel glyph-based summary representations and a combination of temporal glyphs in a graph representation are used to give an overview of route changes to specific destinations over time. To evaluate our tool, real-world case studies demonstrate the usage of Vistracer in practice on large-scale data sets.deu
dc.description.versionpublished
dc.identifier.citationProceedings of the Ninth International Symposium on Visualization for Cyber Security. - New York, NY : ACM, 2012. - S. 80-87. - ISBN 978-1-4503-1413-8deu
dc.identifier.doi10.1145/2379690.2379701deu
dc.identifier.urihttp://kops.uni-konstanz.de/handle/123456789/22282
dc.language.isoengdeu
dc.legacy.dateIssued2013-03-01deu
dc.rightsterms-of-usedeu
dc.rights.urihttps://rightsstatements.org/page/InC/1.0/deu
dc.subject.ddc004deu
dc.titleVisTracer : a visual analytics tool to investigate routing anomalies in tracerouteseng
dc.typeINPROCEEDINGSdeu
dspace.entity.typePublication
kops.citation.bibtex
@inproceedings{Fischer2012VisTr-22282,
  year={2012},
  doi={10.1145/2379690.2379701},
  title={VisTracer : a visual analytics tool to investigate routing anomalies in traceroutes},
  isbn={978-1-4503-1413-8},
  publisher={ACM Press},
  address={New York, New York, USA},
  booktitle={Proceedings of the Ninth International Symposium on Visualization for Cyber Security - VizSec '12},
  pages={80--87},
  author={Fischer, Fabian and Fuchs, Johannes and Vervier, Pierre-Antoine and Mansmann, Florian and Thonnard, Olivier}
}
kops.citation.iso690FISCHER, Fabian, Johannes FUCHS, Pierre-Antoine VERVIER, Florian MANSMANN, Olivier THONNARD, 2012. VisTracer : a visual analytics tool to investigate routing anomalies in traceroutes. the Ninth International Symposium. Seattle, Washington, 15. Okt. 2012 - 15. Okt. 2012. In: Proceedings of the Ninth International Symposium on Visualization for Cyber Security - VizSec '12. New York, New York, USA: ACM Press, 2012, pp. 80-87. ISBN 978-1-4503-1413-8. Available under: doi: 10.1145/2379690.2379701deu
kops.citation.iso690FISCHER, Fabian, Johannes FUCHS, Pierre-Antoine VERVIER, Florian MANSMANN, Olivier THONNARD, 2012. VisTracer : a visual analytics tool to investigate routing anomalies in traceroutes. the Ninth International Symposium. Seattle, Washington, Oct 15, 2012 - Oct 15, 2012. In: Proceedings of the Ninth International Symposium on Visualization for Cyber Security - VizSec '12. New York, New York, USA: ACM Press, 2012, pp. 80-87. ISBN 978-1-4503-1413-8. Available under: doi: 10.1145/2379690.2379701eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/22282">
    <dcterms:issued>2012</dcterms:issued>
    <dc:language>eng</dc:language>
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:contributor>Fischer, Fabian</dc:contributor>
    <dc:contributor>Mansmann, Florian</dc:contributor>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/22282"/>
    <dc:creator>Mansmann, Florian</dc:creator>
    <dcterms:abstract xml:lang="deu">Routing in the Internet is vulnerable to attacks due to the insecure design of the border gateway protocol (BGP). One possible exploitation of this insecure design is the hijacking of IP blocks. Such hijacked IP blocks can then be used to conduct malicious activities from seemingly legitimate IP addresses. In this study we actively trace and monitor the routes to spam sources over several consecutive days after having received a spam message from such a source. However, the real challenge is to distinguish between legitimate routing changes and those ones that are related to systematic misuse in so-called spam campaigns. To combine the strengths of human judgement and computational efficiency, we thus present a novel visual analytics tool named Vistracer in this paper. This tool represents analysis results of our anomaly detection algorithms on large traceroute data sets with the help of several scalable representations to support the analyst to explore, identify and analyze suspicious events and their relations to malicious activities. In particular, pixel-based visualization techniques, novel glyph-based summary representations and a combination of temporal glyphs in a graph representation are used to give an overview of route changes to specific destinations over time. To evaluate our tool, real-world case studies demonstrate the usage of Vistracer in practice on large-scale data sets.</dcterms:abstract>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2013-03-01T14:29:46Z</dcterms:available>
    <dc:contributor>Vervier, Pierre-Antoine</dc:contributor>
    <dcterms:bibliographicCitation>Proceedings of the Ninth International Symposium on Visualization for Cyber Security. - New York, NY : ACM, 2012. - S. 80-87. - ISBN 978-1-4503-1413-8</dcterms:bibliographicCitation>
    <dc:creator>Thonnard, Olivier</dc:creator>
    <dc:contributor>Thonnard, Olivier</dc:contributor>
    <dc:contributor>Fuchs, Johannes</dc:contributor>
    <dc:creator>Fischer, Fabian</dc:creator>
    <dc:rights>terms-of-use</dc:rights>
    <dc:creator>Vervier, Pierre-Antoine</dc:creator>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2013-03-01T14:29:46Z</dc:date>
    <dcterms:title>VisTracer : a visual analytics tool to investigate routing anomalies in traceroutes</dcterms:title>
    <dc:creator>Fuchs, Johannes</dc:creator>
  </rdf:Description>
</rdf:RDF>
kops.conferencefieldthe Ninth International Symposium, 15. Okt. 2012 - 15. Okt. 2012, Seattle, Washingtondeu
kops.date.conferenceEnd2012-10-15
kops.date.conferenceStart2012-10-15
kops.flag.knbibliographytrue
kops.identifier.nbnurn:nbn:de:bsz:352-222825deu
kops.location.conferenceSeattle, Washington
kops.sourcefield<i>Proceedings of the Ninth International Symposium on Visualization for Cyber Security - VizSec '12</i>. New York, New York, USA: ACM Press, 2012, pp. 80-87. ISBN 978-1-4503-1413-8. Available under: doi: 10.1145/2379690.2379701deu
kops.sourcefield.plainProceedings of the Ninth International Symposium on Visualization for Cyber Security - VizSec '12. New York, New York, USA: ACM Press, 2012, pp. 80-87. ISBN 978-1-4503-1413-8. Available under: doi: 10.1145/2379690.2379701deu
kops.sourcefield.plainProceedings of the Ninth International Symposium on Visualization for Cyber Security - VizSec '12. New York, New York, USA: ACM Press, 2012, pp. 80-87. ISBN 978-1-4503-1413-8. Available under: doi: 10.1145/2379690.2379701eng
kops.submitter.emailoleg.kozlov@uni-konstanz.dedeu
kops.title.conferencethe Ninth International Symposium
relation.isAuthorOfPublication7a775974-2508-4a1c-b786-d48032df7443
relation.isAuthorOfPublication6dc854f5-8120-4da2-9c7a-c42f860f77fc
relation.isAuthorOfPublication90244953-4003-4a15-ae6e-0b9d164ea2a3
relation.isAuthorOfPublication.latestForDiscovery7a775974-2508-4a1c-b786-d48032df7443
source.bibliographicInfo.fromPage80
source.bibliographicInfo.toPage87
source.identifier.isbn978-1-4503-1413-8
source.publisherACM Press
source.publisher.locationNew York, New York, USA
source.titleProceedings of the Ninth International Symposium on Visualization for Cyber Security - VizSec '12

Dateien

Lizenzbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
license.txt
Größe:
1.92 KB
Format:
Plain Text
Beschreibung:
license.txt
license.txtGröße: 1.92 KBDownloads: 0