作者
Kulsoom Abdullah, Chris Lee, Gregory Conti, John A Copeland
发表日期
2005/6/15
研讨会论文
Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC
页码范围
100-108
出版商
IEEE
简介
As the trend of successful network attacks continue to rise, better forms of intrusion detection and prevention are needed. This paper addresses network traffic visualization techniques that aid an administrator in recognizing attacks in real time. Our approach improves upon current techniques that lack effectiveness due to an overemphasis on flow, nodes, or assumed familiarity with the attack tool, causing either late reaction or missed detection. A port-based overview of network activity produces a improved representation for detecting and responding to malicious activity. We have found that presenting an overview using stacked histograms of aggregate port activity, combined with the ability to drill-down for finer details allows small, yet important details to be noticed and investigated without being obscured by large, usual traffic. Due to the amount of traffic as well as the range of possible port numbers and IP …
引用总数
2006200720082009201020112012201320142015201620172018201920202021202286411485799827122
学术搜索中的文章
K Abdullah, C Lee, G Conti, JA Copeland - Proceedings from the Sixth Annual IEEE SMC …, 2005