The Community for Technology Leaders
Visualization for Computer Security, IEEE Workshops on (2005)
Minneapolis, Minnesota
Oct. 26, 2005 to Oct. 26, 2005
ISBN: 0-7803-9477-1
pp: 5
Yan Chen , Northwestern University
Zhichun Li , Northwestern University
Pin Ren , Northwestern University
Yan Gao , Northwestern University
Benjamin Watson , Northwestern University
<p>Traffic anomalies and attacks are commonplace in today's networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusion detection system (IDS), it is crucial to detect at the flow-level for accurate detection and mitigation. However, existing IDS systems offer only limited support for 1) interactively examining detected intrusions and anomalies, 2) analyzing worm propagation patterns, 3) and discovering correlated attacks. These problems are becoming even more acute as the traffic on today's high-speed routers continues to grow.</p> <p>IDGraphs is an interactive visualization system for intrusion detection that addresses these challenges. The central visualization in the system is a flow-level trace plotted with time on the horizontal axis and aggregated number of unsuccessful connections on the vertical axis. We then summarize a stack of tens or hundreds of thousands of these traces using the Histographs[23] technique, which maps data frequency at each pixel to brightness. Users may then interactively query the summary view, performing analysis by highlighting subsets of the traces. For example, brushing a linked correlation matrix view highlights traces with similar patterns, revealing distributed attacks that are difficult to detect using standard statistical analysis.</p> <p>We apply IDGraphs system to a real network router data-set with 179M flow-level records representing a total traffic of 1.16TB. The system successfully detects and analyzes a variety of attacks and anomalies, including port scanning, worm outbreaks, stealthy TCP SYN floodings, and some distributed attacks.</p>
Intrusion Detection, Visualization, Interactive System, Brushing and Linking, Correlation Matrix, Dynamic Query
Yan Chen, Zhichun Li, Pin Ren, Yan Gao, Benjamin Watson, "IDGraphs: Intrusion Detection and Analysis Using Histographs", Visualization for Computer Security, IEEE Workshops on, vol. 00, no. , pp. 5, 2005, doi:10.1109/VIZSEC.2005.7
93 ms
(Ver 3.3 (11022016))