The Community for Technology Leaders
RSS Icon
Subscribe
Minneapolis, Minnesota
Oct. 26, 2005 to Oct. 26, 2005
ISBN: 0-7803-9477-1
pp: 11
Hideki Koike , University of Electro-Communications
Kazuhiro Ohno , University of Electro-Communications
Kanba Koizumi , Keio University
ABSTRACT
<p>An Internet cyber threat monitoring system detects cyber threats using network sensors deployed at particular points on the Internet, statistically analyzes the time of attack, source of attack, and type of attack, and then visualizes the result of this analysis. Existing systems, however, simply visualize country-by-country statistics of attacks or hourly changes of attacks. Using these systems, it is dif- ficult to understand the source of attack, the diffusion of the attack, or the relation between the target and the source of the attack.</p> <p>or the relation between the target and the source of the attack. This paper described a method for visualizing cyber threats by using 2-dimensional matrix representation of IP addresses. The advantages of this method are that: (1) the logical distance of IP addresses is represented intuitively, (2) Internet address space is visualized economically, (3) macroscopic information (Internet level) and microscopic information (local level) are visualized simultaneously. By using this visualization framework, propagation of the Welchia worm and the Sasser.D worm are visualized.</p>
INDEX TERMS
intrusion detection, information visualization, information security, computer virus, Internet worm, virus visualization, worm visualization, Internet forecasting
CITATION
Hideki Koike, Kazuhiro Ohno, Kanba Koizumi, "Visualizing Cyber Attacks using IP Matrix", VIZSEC, 2005, Visualization for Computer Security, IEEE Workshops on, Visualization for Computer Security, IEEE Workshops on 2005, pp. 11, doi:10.1109/VIZSEC.2005.22
31 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool