Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats

dc.contributor.authorMansmann, Florian
dc.contributor.authorKeim, Daniel A.
dc.contributor.authorNorth, Stephen C.deu
dc.contributor.authorRexroad, Briandeu
dc.contributor.authorSheleheda, Danieldeu
dc.date.accessioned2011-03-24T15:55:41Zdeu
dc.date.available2011-03-24T15:55:41Zdeu
dc.date.issued2007deu
dc.description.abstractThe Internet has become a wild place: malicious code is spread on personal computers across the world, deploying botnets ready to attack the network infrastructure. The vast number of security incidents and other anomalies overwhelms attempts at manual analysis, especially when monitoring service provider backbone links. We present an approach to interactive visualization with a case study indicating that interactive visualization can be applied to gain more insight into these large data sets. We superimpose a hierarchy on IP address space, and study the suitability of Treemap variants for each hierarchy level. Because viewing the whole IP hierarchy at once is not practical for most tasks, we evaluate layout stability when eliding large parts of the hierarchy, while maintaining the visibility and ordering of the data of interest.eng
dc.description.versionpublished
dc.format.mimetypeapplication/pdfdeu
dc.identifier.citationFirst publ. in: IEEE transactions on visualization and computer graphics 13 (2007), 6deu
dc.identifier.doi10.1109/TVCG.2007.70522
dc.identifier.ppn288212754deu
dc.identifier.urihttp://kops.uni-konstanz.de/handle/123456789/5472
dc.language.isoengdeu
dc.legacy.dateIssued2008deu
dc.rightsAttribution-NonCommercial-NoDerivs 2.0 Generic
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.0/
dc.subjectInformation visualizationdeu
dc.subjectnetwork securitydeu
dc.subjectnetwork monitoringdeu
dc.subjecttreemapdeu
dc.subject.ddc004deu
dc.titleVisual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threatseng
dc.typeJOURNAL_ARTICLEdeu
dspace.entity.typePublication
kops.citation.bibtex
@article{Mansmann2007Visua-5472,
  year={2007},
  doi={10.1109/TVCG.2007.70522},
  title={Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats},
  number={6},
  volume={13},
  journal={IEEE transactions on visualization and computer graphics},
  author={Mansmann, Florian and Keim, Daniel A. and North, Stephen C. and Rexroad, Brian and Sheleheda, Daniel}
}
kops.citation.iso690MANSMANN, Florian, Daniel A. KEIM, Stephen C. NORTH, Brian REXROAD, Daniel SHELEHEDA, 2007. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. In: IEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522deu
kops.citation.iso690MANSMANN, Florian, Daniel A. KEIM, Stephen C. NORTH, Brian REXROAD, Daniel SHELEHEDA, 2007. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. In: IEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/5472">
    <dcterms:issued>2007</dcterms:issued>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:55:41Z</dc:date>
    <dc:contributor>Rexroad, Brian</dc:contributor>
    <dc:contributor>North, Stephen C.</dc:contributor>
    <dc:contributor>Keim, Daniel A.</dc:contributor>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/5472/1/InfoVis2007NetworkSecurity.pdf"/>
    <dcterms:rights rdf:resource="http://creativecommons.org/licenses/by-nc-nd/2.0/"/>
    <dc:creator>Sheleheda, Daniel</dc:creator>
    <dcterms:bibliographicCitation>First publ. in: IEEE transactions on visualization and computer graphics 13 (2007), 6</dcterms:bibliographicCitation>
    <dc:creator>North, Stephen C.</dc:creator>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:format>application/pdf</dc:format>
    <dc:creator>Mansmann, Florian</dc:creator>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:55:41Z</dcterms:available>
    <dc:creator>Rexroad, Brian</dc:creator>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dc:contributor>Sheleheda, Daniel</dc:contributor>
    <dc:creator>Keim, Daniel A.</dc:creator>
    <dc:language>eng</dc:language>
    <dc:contributor>Mansmann, Florian</dc:contributor>
    <dcterms:title>Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats</dcterms:title>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:abstract xml:lang="eng">The Internet has become a wild place: malicious code is spread on personal computers across the world, deploying botnets ready to attack the network infrastructure. The vast number of security incidents and other anomalies overwhelms attempts at manual analysis, especially when monitoring service provider backbone links. We present an approach to interactive visualization with a case study indicating that interactive visualization can be applied to gain more insight into these large data sets. We superimpose a hierarchy on IP address space, and study the suitability of Treemap variants for each hierarchy level. Because viewing the whole IP hierarchy at once is not practical for most tasks, we evaluate layout stability when eliding large parts of the hierarchy, while maintaining the visibility and ordering of the data of interest.</dcterms:abstract>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/5472"/>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/5472/1/InfoVis2007NetworkSecurity.pdf"/>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:rights>Attribution-NonCommercial-NoDerivs 2.0 Generic</dc:rights>
  </rdf:Description>
</rdf:RDF>
kops.description.openAccessopenaccessgreen
kops.flag.knbibliographytrue
kops.identifier.nbnurn:nbn:de:bsz:352-opus-68688deu
kops.opus.id6868deu
kops.sourcefieldIEEE transactions on visualization and computer graphics. 2007, <b>13</b>(6). Available under: doi: 10.1109/TVCG.2007.70522deu
kops.sourcefield.plainIEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522deu
kops.sourcefield.plainIEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522eng
relation.isAuthorOfPublication90244953-4003-4a15-ae6e-0b9d164ea2a3
relation.isAuthorOfPublicationda7dafb0-6003-4fd4-803c-11e1e72d621a
relation.isAuthorOfPublication.latestForDiscovery90244953-4003-4a15-ae6e-0b9d164ea2a3
source.bibliographicInfo.issue6
source.bibliographicInfo.volume13
source.periodicalTitleIEEE transactions on visualization and computer graphics

Dateien

Originalbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
InfoVis2007NetworkSecurity.pdf
Größe:
1.29 MB
Format:
Adobe Portable Document Format
InfoVis2007NetworkSecurity.pdf
InfoVis2007NetworkSecurity.pdfGröße: 1.29 MBDownloads: 958