Visualization Symposium, IEEE Pacific (2014)
Yokohama, Japan Japan
Mar. 4, 2014 to Mar. 7, 2014
Large-scale networks have become increasingly challenging to manage. It is vital for a system administrator or network manager to be able to analyze the vast amount of log data in order to detect suspicious behaviors or patterns, possibly due to malicious users/applications or faulty devices. While an intrusion detection system (IDS) log can provide a large number of warnings, exactly which alarms are true while the others are false, and more importantly what are the underlying causes are still difficult to know. To bridge the gap between network log and anomaly discovery, we design and implement a visualization tool that combines multiple commodity visualizations with minimum learning curve. While each individual view is well understood, the effects of such views in analyzing network anomalies are not well studied. Since each visualization technique has advantages as well as limitations in addressing a particular task, we show that these views, when combined and linked together, may provide an effective and lightweight network anomaly analysis tool. The web-based open platform may simplify network administration as well as promote collaborative analysis among researchers.
Data visualization, Servers, Joining processes, Market research, Image color analysis, Visualization, Security,Network Anomaly Visualization,
Tao Zhang, Qi Liao, Lei Shi, "Bridging the Gap of Network Management and Anomaly Detection through Interactive Visualization", Visualization Symposium, IEEE Pacific, vol. 00, no. , pp. 253-257, 2014, doi:10.1109/PacificVis.2014.22