Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats
| dc.contributor.author | Mansmann, Florian | |
| dc.contributor.author | Keim, Daniel A. | |
| dc.contributor.author | North, Stephen C. | deu |
| dc.contributor.author | Rexroad, Brian | deu |
| dc.contributor.author | Sheleheda, Daniel | deu |
| dc.date.accessioned | 2011-03-24T15:55:41Z | deu |
| dc.date.available | 2011-03-24T15:55:41Z | deu |
| dc.date.issued | 2007 | deu |
| dc.description.abstract | The Internet has become a wild place: malicious code is spread on personal computers across the world, deploying botnets ready to attack the network infrastructure. The vast number of security incidents and other anomalies overwhelms attempts at manual analysis, especially when monitoring service provider backbone links. We present an approach to interactive visualization with a case study indicating that interactive visualization can be applied to gain more insight into these large data sets. We superimpose a hierarchy on IP address space, and study the suitability of Treemap variants for each hierarchy level. Because viewing the whole IP hierarchy at once is not practical for most tasks, we evaluate layout stability when eliding large parts of the hierarchy, while maintaining the visibility and ordering of the data of interest. | eng |
| dc.description.version | published | |
| dc.format.mimetype | application/pdf | deu |
| dc.identifier.citation | First publ. in: IEEE transactions on visualization and computer graphics 13 (2007), 6 | deu |
| dc.identifier.doi | 10.1109/TVCG.2007.70522 | |
| dc.identifier.ppn | 288212754 | deu |
| dc.identifier.uri | http://kops.uni-konstanz.de/handle/123456789/5472 | |
| dc.language.iso | eng | deu |
| dc.legacy.dateIssued | 2008 | deu |
| dc.rights | Attribution-NonCommercial-NoDerivs 2.0 Generic | |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/2.0/ | |
| dc.subject | Information visualization | deu |
| dc.subject | network security | deu |
| dc.subject | network monitoring | deu |
| dc.subject | treemap | deu |
| dc.subject.ddc | 004 | deu |
| dc.title | Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats | eng |
| dc.type | JOURNAL_ARTICLE | deu |
| dspace.entity.type | Publication | |
| kops.citation.bibtex | @article{Mansmann2007Visua-5472,
year={2007},
doi={10.1109/TVCG.2007.70522},
title={Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats},
number={6},
volume={13},
journal={IEEE transactions on visualization and computer graphics},
author={Mansmann, Florian and Keim, Daniel A. and North, Stephen C. and Rexroad, Brian and Sheleheda, Daniel}
} | |
| kops.citation.iso690 | MANSMANN, Florian, Daniel A. KEIM, Stephen C. NORTH, Brian REXROAD, Daniel SHELEHEDA, 2007. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. In: IEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522 | deu |
| kops.citation.iso690 | MANSMANN, Florian, Daniel A. KEIM, Stephen C. NORTH, Brian REXROAD, Daniel SHELEHEDA, 2007. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. In: IEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522 | eng |
| kops.citation.rdf | <rdf:RDF
xmlns:dcterms="http://purl.org/dc/terms/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:bibo="http://purl.org/ontology/bibo/"
xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
xmlns:foaf="http://xmlns.com/foaf/0.1/"
xmlns:void="http://rdfs.org/ns/void#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#" >
<rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/5472">
<dcterms:issued>2007</dcterms:issued>
<dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:55:41Z</dc:date>
<dc:contributor>Rexroad, Brian</dc:contributor>
<dc:contributor>North, Stephen C.</dc:contributor>
<dc:contributor>Keim, Daniel A.</dc:contributor>
<dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/5472/1/InfoVis2007NetworkSecurity.pdf"/>
<dcterms:rights rdf:resource="http://creativecommons.org/licenses/by-nc-nd/2.0/"/>
<dc:creator>Sheleheda, Daniel</dc:creator>
<dcterms:bibliographicCitation>First publ. in: IEEE transactions on visualization and computer graphics 13 (2007), 6</dcterms:bibliographicCitation>
<dc:creator>North, Stephen C.</dc:creator>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dc:format>application/pdf</dc:format>
<dc:creator>Mansmann, Florian</dc:creator>
<dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:55:41Z</dcterms:available>
<dc:creator>Rexroad, Brian</dc:creator>
<void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
<dc:contributor>Sheleheda, Daniel</dc:contributor>
<dc:creator>Keim, Daniel A.</dc:creator>
<dc:language>eng</dc:language>
<dc:contributor>Mansmann, Florian</dc:contributor>
<dcterms:title>Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats</dcterms:title>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dcterms:abstract xml:lang="eng">The Internet has become a wild place: malicious code is spread on personal computers across the world, deploying botnets ready to attack the network infrastructure. The vast number of security incidents and other anomalies overwhelms attempts at manual analysis, especially when monitoring service provider backbone links. We present an approach to interactive visualization with a case study indicating that interactive visualization can be applied to gain more insight into these large data sets. We superimpose a hierarchy on IP address space, and study the suitability of Treemap variants for each hierarchy level. Because viewing the whole IP hierarchy at once is not practical for most tasks, we evaluate layout stability when eliding large parts of the hierarchy, while maintaining the visibility and ordering of the data of interest.</dcterms:abstract>
<bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/5472"/>
<dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/5472/1/InfoVis2007NetworkSecurity.pdf"/>
<foaf:homepage rdf:resource="http://localhost:8080/"/>
<dc:rights>Attribution-NonCommercial-NoDerivs 2.0 Generic</dc:rights>
</rdf:Description>
</rdf:RDF> | |
| kops.description.openAccess | openaccessgreen | |
| kops.flag.knbibliography | true | |
| kops.identifier.nbn | urn:nbn:de:bsz:352-opus-68688 | deu |
| kops.opus.id | 6868 | deu |
| kops.sourcefield | IEEE transactions on visualization and computer graphics. 2007, <b>13</b>(6). Available under: doi: 10.1109/TVCG.2007.70522 | deu |
| kops.sourcefield.plain | IEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522 | deu |
| kops.sourcefield.plain | IEEE transactions on visualization and computer graphics. 2007, 13(6). Available under: doi: 10.1109/TVCG.2007.70522 | eng |
| relation.isAuthorOfPublication | 90244953-4003-4a15-ae6e-0b9d164ea2a3 | |
| relation.isAuthorOfPublication | da7dafb0-6003-4fd4-803c-11e1e72d621a | |
| relation.isAuthorOfPublication.latestForDiscovery | 90244953-4003-4a15-ae6e-0b9d164ea2a3 | |
| source.bibliographicInfo.issue | 6 | |
| source.bibliographicInfo.volume | 13 | |
| source.periodicalTitle | IEEE transactions on visualization and computer graphics |
Dateien
Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
- Name:
- InfoVis2007NetworkSecurity.pdf
- Größe:
- 1.29 MB
- Format:
- Adobe Portable Document Format
