Publikation: Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats
Dateien
Datum
Autor:innen
Herausgeber:innen
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
URI (zitierfähiger Link)
DOI (zitierfähiger Link)
Internationale Patentnummer
Link zur Lizenz
Angaben zur Forschungsförderung
Projekt
Open Access-Veröffentlichung
Core Facility der Universität Konstanz
Titel in einer weiteren Sprache
Publikationstyp
Publikationsstatus
Erschienen in
Zusammenfassung
The Internet has become a wild place: malicious code is spread on personal computers across the world, deploying botnets ready to attack the network infrastructure. The vast number of security incidents and other anomalies overwhelms attempts at manual analysis, especially when monitoring service provider backbone links. We present an approach to interactive visualization with a case study indicating that interactive visualization can be applied to gain more insight into these large data sets. We superimpose a hierarchy on IP address space, and study the suitability of Treemap variants for each hierarchy level. Because viewing the whole IP hierarchy at once is not practical for most tasks, we evaluate layout stability when eliding large parts of the hierarchy, while maintaining the visibility and ordering of the data of interest.
Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
Schlagwörter
Konferenz
Rezension
Zitieren
ISO 690
MANSMANN, Florian, Daniel A. KEIM, Stephen C. NORTH, Brian REXROAD, Daniel SHELEHEDA, 2007. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. In: IEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522BibTex
@article{Mansmann2007Visua-5472, year={2007}, doi={10.1109/TVCG.2007.70522}, title={Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats}, number={6}, volume={13}, journal={IEEE transactions on visualization and computer graphics}, author={Mansmann, Florian and Keim, Daniel A. and North, Stephen C. and Rexroad, Brian and Sheleheda, Daniel} }
RDF
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/5472"> <dcterms:issued>2007</dcterms:issued> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:55:41Z</dc:date> <dc:contributor>Rexroad, Brian</dc:contributor> <dc:contributor>North, Stephen C.</dc:contributor> <dc:contributor>Keim, Daniel A.</dc:contributor> <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/5472/1/InfoVis2007NetworkSecurity.pdf"/> <dcterms:rights rdf:resource="http://creativecommons.org/licenses/by-nc-nd/2.0/"/> <dc:creator>Sheleheda, Daniel</dc:creator> <dcterms:bibliographicCitation>First publ. in: IEEE transactions on visualization and computer graphics 13 (2007), 6</dcterms:bibliographicCitation> <dc:creator>North, Stephen C.</dc:creator> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:format>application/pdf</dc:format> <dc:creator>Mansmann, Florian</dc:creator> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:55:41Z</dcterms:available> <dc:creator>Rexroad, Brian</dc:creator> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dc:contributor>Sheleheda, Daniel</dc:contributor> <dc:creator>Keim, Daniel A.</dc:creator> <dc:language>eng</dc:language> <dc:contributor>Mansmann, Florian</dc:contributor> <dcterms:title>Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats</dcterms:title> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dcterms:abstract xml:lang="eng">The Internet has become a wild place: malicious code is spread on personal computers across the world, deploying botnets ready to attack the network infrastructure. The vast number of security incidents and other anomalies overwhelms attempts at manual analysis, especially when monitoring service provider backbone links. We present an approach to interactive visualization with a case study indicating that interactive visualization can be applied to gain more insight into these large data sets. We superimpose a hierarchy on IP address space, and study the suitability of Treemap variants for each hierarchy level. Because viewing the whole IP hierarchy at once is not practical for most tasks, we evaluate layout stability when eliding large parts of the hierarchy, while maintaining the visibility and ordering of the data of interest.</dcterms:abstract> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/5472"/> <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/5472/1/InfoVis2007NetworkSecurity.pdf"/> <foaf:homepage rdf:resource="http://localhost:8080/"/> <dc:rights>Attribution-NonCommercial-NoDerivs 2.0 Generic</dc:rights> </rdf:Description> </rdf:RDF>