Large-scale Network Monitoring for Visual Analysis of Attacks

Cite This

Files in this item

Checksum: MD5:256e9c69d0a59db7fadca20c0ae92469

FISCHER, Fabian, Florian MANSMANN, Daniel A. KEIM, Stephan PIETZKO, Marcel WALDVOGEL, 2008. Large-scale Network Monitoring for Visual Analysis of Attacks. In: GOODALL, John R., ed., Gregory CONTI, ed., Kwan-Liu MA, ed.. Visualization for Computer Security. Berlin, Heidelberg:Springer Berlin Heidelberg, pp. 111-118. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-540-85931-4. Available under: doi: 10.1007/978-3-540-85933-8_11

@inproceedings{Fischer2008Large-5511, title={Large-scale Network Monitoring for Visual Analysis of Attacks}, year={2008}, doi={10.1007/978-3-540-85933-8_11}, isbn={978-3-540-85931-4}, issn={0302-9743}, address={Berlin, Heidelberg}, publisher={Springer Berlin Heidelberg}, series={Lecture Notes in Computer Science}, booktitle={Visualization for Computer Security}, pages={111--118}, editor={Goodall, John R. and Conti, Gregory and Ma, Kwan-Liu}, author={Fischer, Fabian and Mansmann, Florian and Keim, Daniel A. and Pietzko, Stephan and Waldvogel, Marcel} }

<rdf:RDF xmlns:dcterms="" xmlns:dc="" xmlns:rdf="" xmlns:bibo="" xmlns:dspace="" xmlns:foaf="" xmlns:void="" xmlns:xsd="" > <rdf:Description rdf:about=""> <dcterms:isPartOf rdf:resource=""/> <dcterms:bibliographicCitation>First publ. in: Visualization for Computer Security: 5th Internat. Workshop, Proceedings / John R. Goodall ... (Eds.). - Berlin: Springer, 2008, pp. 111-118</dcterms:bibliographicCitation> <foaf:homepage rdf:resource="http://localhost:8080/jspui"/> <dcterms:available rdf:datatype="">2011-03-24T15:56:07Z</dcterms:available> <dcterms:rights rdf:resource=""/> <dc:contributor>Mansmann, Florian</dc:contributor> <dc:contributor>Waldvogel, Marcel</dc:contributor> <dc:creator>Mansmann, Florian</dc:creator> <dc:creator>Waldvogel, Marcel</dc:creator> <dc:format>application/pdf</dc:format> <dspace:isPartOfCollection rdf:resource=""/> <dc:rights>terms-of-use</dc:rights> <dcterms:issued>2008</dcterms:issued> <dcterms:title>Large-scale Network Monitoring for Visual Analysis of Attacks</dcterms:title> <dcterms:hasPart rdf:resource=""/> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dc:creator>Pietzko, Stephan</dc:creator> <dc:contributor>Pietzko, Stephan</dc:contributor> <dc:creator>Fischer, Fabian</dc:creator> <bibo:uri rdf:resource=""/> <dspace:hasBitstream rdf:resource=""/> <dc:contributor>Keim, Daniel A.</dc:contributor> <dcterms:abstract xml:lang="eng">The importance of the Internet and our dependency on computer networks are steadily growing, which results in high costs and substantial consequences in case of successful intrusions, stolen data, and interrupted services. At the same time, a trend towards massive attacks against the network infrastructure is noticeable. Therefore, monitoring large networks has become an importatnt field in practice and research. Through monitoring systems, attacks can be detected and analyzed to gain knowledge of how to better protect the network in the future. In the scope of this paper, we present a system to analyze NetFlow data using a relational database system. NetFlow records are linked with alerts from an intrusion detection system to enable efficient exploration of suspicious activity within the monitored network. Within the system, the monitored network is mapped to a TreeMap visualization, the attackers are arranged at the borders and linked using splines parameterized with prefix information. In a series of case studies, we demonstrate how the tool can be used to judge the relevance of alerts, to reveal massive distributed attacks, and to analyze service usage within a network.</dcterms:abstract> <dc:language>eng</dc:language> <dc:creator>Keim, Daniel A.</dc:creator> <dc:contributor>Fischer, Fabian</dc:contributor> <dc:date rdf:datatype="">2011-03-24T15:56:07Z</dc:date> </rdf:Description> </rdf:RDF>

Downloads since Oct 1, 2014 (Information about access statistics)

vizsec2008.pdf 697

This item appears in the following Collection(s)

terms-of-use Except where otherwise noted, this item's license is described as terms-of-use

Search KOPS


My Account