DocumentCode :
2014702
Title :
A Novel Visualization Approach for Efficient Network Scans Detection
Author :
Jiawan, Zhang ; Liang, Li ; Liangfu, Lu ; Ning, Zhou
Author_Institution :
Sch. of Comput. Sci. & Technol., Tianjin Univ., Tianjin, China
fYear :
2008
fDate :
13-15 Dec. 2008
Firstpage :
23
Lastpage :
26
Abstract :
Network scans visualization provides very effective means for to detection large scale network scans. Many visualization methods have been developed to monitor network traffic, but all the techniques or tools still heavily rely on human detection. They seldom consider the importance of network event characteristics to the network data visualization, and cannot detect slow scans, hidden scans etc. In this paper a visual interactive network scans detection system called ScanViewer is designed to represent traffic activities that reside in network flows and their patterns. The ScanViewer combines the characteristics of network scan with novel visual structures, and utilizes a set of different visual concepts to map the collected datagram to the graphs that emphasize their patterns. Additionally, a new tool named localport is designed for to capture large-scale ports information. The experiments show that ScanViewer can not only detect network scans, port scans, distributed port scans, but also can detect the hidden scans etc.
Keywords :
computer networks; data visualisation; interactive systems; telecommunication security; telecommunication traffic; monitor network traffic; network data visualization; network security; scanviewer; visual interactive network scans detection system; Computer science; Data visualization; Event detection; Humans; Information analysis; Intrusion detection; Large-scale systems; Monitoring; Telecommunication traffic; Timing; information visualization; network scan; network security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 2008. SECTECH '08. International Conference on
Conference_Location :
Hainan Island
Print_ISBN :
978-0-7695-3486-2
Type :
conf
DOI :
10.1109/SecTech.2008.47
Filename :
4725337
Link To Document :
بازگشت