Large-scale Network Monitoring for Visual Analysis of Attacks

Zitieren

Dateien zu dieser Ressource

Prüfsumme: MD5:256e9c69d0a59db7fadca20c0ae92469

FISCHER, Fabian, Florian MANSMANN, Daniel A. KEIM, Stephan PIETZKO, Marcel WALDVOGEL, 2008. Large-scale Network Monitoring for Visual Analysis of Attacks. In: GOODALL, John R., ed., Gregory CONTI, ed., Kwan-Liu MA, ed.. Visualization for Computer Security. Berlin, Heidelberg:Springer Berlin Heidelberg, pp. 111-118. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-540-85931-4

@inproceedings{Fischer2008Large-5511, title={Large-scale Network Monitoring for Visual Analysis of Attacks}, year={2008}, doi={10.1007/978-3-540-85933-8_11}, isbn={978-3-540-85931-4}, issn={0302-9743}, address={Berlin, Heidelberg}, publisher={Springer Berlin Heidelberg}, series={Lecture Notes in Computer Science}, booktitle={Visualization for Computer Security}, pages={111--118}, editor={Goodall, John R. and Conti, Gregory and Ma, Kwan-Liu}, author={Fischer, Fabian and Mansmann, Florian and Keim, Daniel A. and Pietzko, Stephan and Waldvogel, Marcel} }

<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/rdf/resource/123456789/5511"> <dcterms:bibliographicCitation>First publ. in: Visualization for Computer Security: 5th Internat. Workshop, Proceedings / John R. Goodall ... (Eds.). - Berlin: Springer, 2008, pp. 111-118</dcterms:bibliographicCitation> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:56:07Z</dcterms:available> <dcterms:rights rdf:resource="https://creativecommons.org/licenses/by-nc-nd/2.0/legalcode"/> <dc:contributor>Mansmann, Florian</dc:contributor> <dc:contributor>Waldvogel, Marcel</dc:contributor> <dc:creator>Mansmann, Florian</dc:creator> <dc:creator>Waldvogel, Marcel</dc:creator> <dc:format>application/pdf</dc:format> <dcterms:issued>2008</dcterms:issued> <dcterms:title>Large-scale Network Monitoring for Visual Analysis of Attacks</dcterms:title> <dc:creator>Pietzko, Stephan</dc:creator> <dc:contributor>Pietzko, Stephan</dc:contributor> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/5511"/> <dc:creator>Fischer, Fabian</dc:creator> <dc:contributor>Keim, Daniel A.</dc:contributor> <dcterms:abstract xml:lang="eng">The importance of the Internet and our dependency on computer networks are steadily growing, which results in high costs and substantial consequences in case of successful intrusions, stolen data, and interrupted services. At the same time, a trend towards massive attacks against the network infrastructure is noticeable. Therefore, monitoring large networks has become an importatnt field in practice and research. Through monitoring systems, attacks can be detected and analyzed to gain knowledge of how to better protect the network in the future. In the scope of this paper, we present a system to analyze NetFlow data using a relational database system. NetFlow records are linked with alerts from an intrusion detection system to enable efficient exploration of suspicious activity within the monitored network. Within the system, the monitored network is mapped to a TreeMap visualization, the attackers are arranged at the borders and linked using splines parameterized with prefix information. In a series of case studies, we demonstrate how the tool can be used to judge the relevance of alerts, to reveal massive distributed attacks, and to analyze service usage within a network.</dcterms:abstract> <dc:language>eng</dc:language> <dc:contributor>Fischer, Fabian</dc:contributor> <dc:creator>Keim, Daniel A.</dc:creator> <dc:rights>deposit-license</dc:rights> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:56:07Z</dc:date> </rdf:Description> </rdf:RDF>

Dateiabrufe seit 01.10.2014 (Informationen über die Zugriffsstatistik)

vizsec2008.pdf 333

Das Dokument erscheint in:

deposit-license Solange nicht anders angezeigt, wird die Lizenz wie folgt beschrieben: deposit-license

KOPS Suche


Stöbern

Mein Benutzerkonto