Grid based network address space browsing for network traffic visualization

Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the use of firewalls for instance. However, these precautions are not always enough and so they also need to monitor the network traffic in order to detect anomalies and intrusions. Usually, system administrators use automated systems to process network traffic logs and to analyze them. This processing is based on learning techniques, signature databases or statistical analysis. Another approach is to use visualization techniques to display these logs and to favor user interaction with the data. This paper presents a visualization design based on interactive grids representing the network space. The network traffic is then displayed on these grids. We also introduce a prototype of this design that has been implemented to test its validity.

Original languageEnglish
Title of host publicationProceedings of the 2006 IEEE Workshop on Information Assurance
PublisherIEEE Computer Society
Pages261-267
Number of pages7
ISBN (Print)1424401305, 9781424401307
Publication statusPublished - Jan 1 2006
Event2006 IEEE Workshop on Information Assurance - West Point, NY, United States
Duration: Jun 21 2006Jun 23 2006

Publication series

NameProceedings of the 2006 IEEE Workshop on Information Assurance
Volume2006

Other

Other2006 IEEE Workshop on Information Assurance
CountryUnited States
CityWest Point, NY
Period6/21/066/23/06

Fingerprint

Computer networks
Visualization
Statistical methods
Processing

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Le Malécot, E., Kohara, M., Hori, Y., & Sakurai, K. (2006). Grid based network address space browsing for network traffic visualization. In Proceedings of the 2006 IEEE Workshop on Information Assurance (pp. 261-267). [1652104] (Proceedings of the 2006 IEEE Workshop on Information Assurance; Vol. 2006). IEEE Computer Society.

Grid based network address space browsing for network traffic visualization. / Le Malécot, Erwan; Kohara, Masayoshi; Hori, Yoshiaki; Sakurai, Kouichi.

Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, 2006. p. 261-267 1652104 (Proceedings of the 2006 IEEE Workshop on Information Assurance; Vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Le Malécot, E, Kohara, M, Hori, Y & Sakurai, K 2006, Grid based network address space browsing for network traffic visualization. in Proceedings of the 2006 IEEE Workshop on Information Assurance., 1652104, Proceedings of the 2006 IEEE Workshop on Information Assurance, vol. 2006, IEEE Computer Society, pp. 261-267, 2006 IEEE Workshop on Information Assurance, West Point, NY, United States, 6/21/06.
Le Malécot E, Kohara M, Hori Y, Sakurai K. Grid based network address space browsing for network traffic visualization. In Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society. 2006. p. 261-267. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance).
Le Malécot, Erwan ; Kohara, Masayoshi ; Hori, Yoshiaki ; Sakurai, Kouichi. / Grid based network address space browsing for network traffic visualization. Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, 2006. pp. 261-267 (Proceedings of the 2006 IEEE Workshop on Information Assurance).
@inproceedings{5eb5bf40cd4c43b18dd994010f7e7c17,
title = "Grid based network address space browsing for network traffic visualization",
abstract = "The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the use of firewalls for instance. However, these precautions are not always enough and so they also need to monitor the network traffic in order to detect anomalies and intrusions. Usually, system administrators use automated systems to process network traffic logs and to analyze them. This processing is based on learning techniques, signature databases or statistical analysis. Another approach is to use visualization techniques to display these logs and to favor user interaction with the data. This paper presents a visualization design based on interactive grids representing the network space. The network traffic is then displayed on these grids. We also introduce a prototype of this design that has been implemented to test its validity.",
author = "{Le Mal{\'e}cot}, Erwan and Masayoshi Kohara and Yoshiaki Hori and Kouichi Sakurai",
year = "2006",
month = "1",
day = "1",
language = "English",
isbn = "1424401305",
series = "Proceedings of the 2006 IEEE Workshop on Information Assurance",
publisher = "IEEE Computer Society",
pages = "261--267",
booktitle = "Proceedings of the 2006 IEEE Workshop on Information Assurance",
address = "United States",

}

TY - GEN

T1 - Grid based network address space browsing for network traffic visualization

AU - Le Malécot, Erwan

AU - Kohara, Masayoshi

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2006/1/1

Y1 - 2006/1/1

N2 - The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the use of firewalls for instance. However, these precautions are not always enough and so they also need to monitor the network traffic in order to detect anomalies and intrusions. Usually, system administrators use automated systems to process network traffic logs and to analyze them. This processing is based on learning techniques, signature databases or statistical analysis. Another approach is to use visualization techniques to display these logs and to favor user interaction with the data. This paper presents a visualization design based on interactive grids representing the network space. The network traffic is then displayed on these grids. We also introduce a prototype of this design that has been implemented to test its validity.

AB - The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the use of firewalls for instance. However, these precautions are not always enough and so they also need to monitor the network traffic in order to detect anomalies and intrusions. Usually, system administrators use automated systems to process network traffic logs and to analyze them. This processing is based on learning techniques, signature databases or statistical analysis. Another approach is to use visualization techniques to display these logs and to favor user interaction with the data. This paper presents a visualization design based on interactive grids representing the network space. The network traffic is then displayed on these grids. We also introduce a prototype of this design that has been implemented to test its validity.

UR - http://www.scopus.com/inward/record.url?scp=33845941474&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33845941474&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33845941474

SN - 1424401305

SN - 9781424401307

T3 - Proceedings of the 2006 IEEE Workshop on Information Assurance

SP - 261

EP - 267

BT - Proceedings of the 2006 IEEE Workshop on Information Assurance

PB - IEEE Computer Society

ER -