The Community for Technology Leaders
Visualization for Computer Security, IEEE Workshops on (2005)
Minneapolis, Minnesota
Oct. 26, 2005 to Oct. 26, 2005
ISBN: 0-7803-9477-1
pp: 11
Hideki Koike , University of Electro-Communications
Kanba Koizumi , Keio University
Kazuhiro Ohno , University of Electro-Communications
<p>An Internet cyber threat monitoring system detects cyber threats using network sensors deployed at particular points on the Internet, statistically analyzes the time of attack, source of attack, and type of attack, and then visualizes the result of this analysis. Existing systems, however, simply visualize country-by-country statistics of attacks or hourly changes of attacks. Using these systems, it is dif- ficult to understand the source of attack, the diffusion of the attack, or the relation between the target and the source of the attack.</p> <p>or the relation between the target and the source of the attack. This paper described a method for visualizing cyber threats by using 2-dimensional matrix representation of IP addresses. The advantages of this method are that: (1) the logical distance of IP addresses is represented intuitively, (2) Internet address space is visualized economically, (3) macroscopic information (Internet level) and microscopic information (local level) are visualized simultaneously. By using this visualization framework, propagation of the Welchia worm and the Sasser.D worm are visualized.</p>
intrusion detection, information visualization, information security, computer virus, Internet worm, virus visualization, worm visualization, Internet forecasting
Hideki Koike, Kanba Koizumi, Kazuhiro Ohno, "Visualizing Cyber Attacks using IP Matrix", Visualization for Computer Security, IEEE Workshops on, vol. 00, no. , pp. 11, 2005, doi:10.1109/VIZSEC.2005.22
101 ms
(Ver 3.3 (11022016))