Skip to main content
Erschienen in: Wireless Personal Communications 4/2018

21.05.2018

Seeflow: A Visualization System Using 2T Hybrid Graph for Characteristics Analysis of Abnormal Netflow

verfasst von: Sheng Zhang, Ronghua Shi, Jue Zhao

Erschienen in: Wireless Personal Communications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the network expansion, the development of information highway, and the numerous data generated by applications, Netflow log size has been rapidly expanding. This paper proposes the use of visualization techniques to quickly and effectively identify network attacks and abnormal events, as well as perceive network security situation. A 2T (combination with Time-series and Treemap) graph visualization system, named Seeflow, is developed, which uses information entropy of Netflow’s features to draw a Time-series graph and use cross-entropies to distinguish between the normal and abnormal flow stream. Time-series graph can overview the network state from macro level. And Treemap graph is used to drill down into details from micro level. In addition, the exponential function is used to conduct quantitative analysis for the performance of Treemap. The Seeflow system also creates graphical features to visually analyze attacks and find interesting patterns. In experiment, VAST Challenge2013 competition dataset is analyzed by Seeflow system. Comparing with the prize-winning works shows that Seeflow can intuitively display network security situation from both of macro and micro level and effectively identify network attacks as well as support decision-making.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lai, J. B., Wang, H. Q., & Jin, S. (2007). Study of network security situation awareness system based on Netflow. Application Research of Computers, 24(8), 167–172. Lai, J. B., Wang, H. Q., & Jin, S. (2007). Study of network security situation awareness system based on Netflow. Application Research of Computers, 24(8), 167–172.
2.
Zurück zum Zitat Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567–581.CrossRef Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567–581.CrossRef
3.
Zurück zum Zitat Zhang, H. (2009). Study on the TOPN abnormal detection based on the netflow data set. Computer and Information Science, 2(3), 103–108.CrossRef Zhang, H. (2009). Study on the TOPN abnormal detection based on the netflow data set. Computer and Information Science, 2(3), 103–108.CrossRef
4.
Zurück zum Zitat Hsiao HW, Chen DN, Wu TJ. (2010). Detecting hiding malicious website using network traffic mining approach. In 2nd international conference on education technology and computer (ICETC),vol. 5, V5-276-V5-280 Hsiao HW, Chen DN, Wu TJ. (2010). Detecting hiding malicious website using network traffic mining approach. In 2nd international conference on education technology and computer (ICETC),vol. 5, V5-276-V5-280
5.
Zurück zum Zitat Yin K and Zhu J. (2011). A novel DoS detection mechanism, in 2011 international conference on mechatronic science, electric engineering and computer (MEC), 296-298. Yin K and Zhu J. (2011). A novel DoS detection mechanism, in 2011 international conference on mechatronic science, electric engineering and computer (MEC), 296-298.
6.
Zurück zum Zitat Sperotto, A. & Pras, A. (2011). Flow-based intrusion detection. In 2011 IFIP/IEEE International Symposium on Integrated Network Management (pp. 958–963). Sperotto, A. & Pras, A. (2011). Flow-based intrusion detection. In 2011 IFIP/IEEE International Symposium on Integrated Network Management (pp. 958–963).
7.
Zurück zum Zitat Francois J, Wang S, Bronzi W, State R, Engel T. (2011). BotCloud: detecting botnets using MapReduce. In 2011 IEEE international workshop on information forensics and security (WIFS), (pp. 1–6). Francois J, Wang S, Bronzi W, State R, Engel T. (2011). BotCloud: detecting botnets using MapReduce. In 2011 IEEE international workshop on information forensics and security (WIFS), (pp. 1–6).
8.
Zurück zum Zitat Lakkaraju, K., Bearavolu, R., Slagell, A., Yurcik, W., North S. (2005). Closing-the-loop in nvisionip: integrating discovery and search in security visualizations. In Visualization for Computer Security, (pp. 75–82). Lakkaraju, K., Bearavolu, R., Slagell, A., Yurcik, W., North S. (2005). Closing-the-loop in nvisionip: integrating discovery and search in security visualizations. In Visualization for Computer Security, (pp. 75–82).
9.
Zurück zum Zitat Taylor, T., Brook S and McHugh J. (2007). Netbytes viewer: An entity-based netflow visualization utility for identifying intru-sive behavior. In The 4th International Workshop on Visualization for Cyber Security, pp. 101–114. Taylor, T., Brook S and McHugh J. (2007). Netbytes viewer: An entity-based netflow visualization utility for identifying intru-sive behavior. In The 4th International Workshop on Visualization for Cyber Security, pp. 101–114.
10.
Zurück zum Zitat Fischer, F., Mansmann, F., Keim, D. A., Pietzko, S., Waldvogel, M. (2008). Large-scale network monitoring for visual analysis of attacks. In 5th international workshop on Visualization for Computer Security, (pp. 111–118). Fischer, F., Mansmann, F., Keim, D. A., Pietzko, S., Waldvogel, M. (2008). Large-scale network monitoring for visual analysis of attacks. In 5th international workshop on Visualization for Computer Security, (pp. 111–118).
11.
Zurück zum Zitat Boschetti A, Salgarelli L, Muelder C, Ma KL. (2011). TVi: a visual querying system for network monitoring and anomaly detection. In Proceedings of the 8th International Symposium on Visualization for Cyber Security, (pp. 1–10). Boschetti A, Salgarelli L, Muelder C, Ma KL. (2011). TVi: a visual querying system for network monitoring and anomaly detection. In Proceedings of the 8th International Symposium on Visualization for Cyber Security, (pp. 1–10).
12.
Zurück zum Zitat Braun, L., Volke, M., Schlamp, J., Bodisco, A., & Carle, G. (2014). Flow-inspector: a framework for visualizing network flow data using current web technologies. Computing, 96(1), 15–26.CrossRef Braun, L., Volke, M., Schlamp, J., Bodisco, A., & Carle, G. (2014). Flow-inspector: a framework for visualizing network flow data using current web technologies. Computing, 96(1), 15–26.CrossRef
13.
Zurück zum Zitat Zhou, F., Shi, R., & Zhao, Y. (2013). NetSecRadar: A visualization system for network security situational awareness. In IEEE Conference on Visual Analytics Science and Technology (VAST 2012) (pp. 403–416). Zhou, F., Shi, R., & Zhao, Y. (2013). NetSecRadar: A visualization system for network security situational awareness. In IEEE Conference on Visual Analytics Science and Technology (VAST 2012) (pp. 403–416).
14.
Zurück zum Zitat Michael, J. M., & Zhao, S. (2011). Hybrid Visualization for Tree and Network Structures. Communications for the CCF, 7(4), 8–13. Michael, J. M., & Zhao, S. (2011). Hybrid Visualization for Tree and Network Structures. Communications for the CCF, 7(4), 8–13.
15.
Zurück zum Zitat Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics, 1(1), 1–19. Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics, 1(1), 1–19.
16.
Zurück zum Zitat Zhang, X., & Yuan, X. (2012). Treemap visualization. Journal of Computer-Aided Design & Computer Graphics, 24(9), 1113–1124. Zhang, X., & Yuan, X. (2012). Treemap visualization. Journal of Computer-Aided Design & Computer Graphics, 24(9), 1113–1124.
17.
Zurück zum Zitat Krstajic M and Keim DA. (2013). Visualization of streaming data: Observing change and context in information visualization techniques. In 2013 IEEE International Conference on Big Data IEEE: Silicon Valley, (pp. 41–47). Krstajic M and Keim DA. (2013). Visualization of streaming data: Observing change and context in information visualization techniques. In 2013 IEEE International Conference on Big Data IEEE: Silicon Valley, (pp. 41–47).
18.
Zurück zum Zitat Wang, Z. & Yuan, X. (2014). Urban trajectory timeline visualization. In 2014 International Conference on Big Data and Smart Computing (BIGCOMP) Bangkok, (pp. 13–18). Wang, Z. & Yuan, X. (2014). Urban trajectory timeline visualization. In 2014 International Conference on Big Data and Smart Computing (BIGCOMP) Bangkok, (pp. 13–18).
19.
Zurück zum Zitat Krstajic, M., Bertini, E., & Keim, D. A. (2011). Cloudlines: Compact display of event episodes in multiple time-series. IEEE Transactions on Visualization and Computer Graphics, 17(12), 2432–2439.CrossRef Krstajic, M., Bertini, E., & Keim, D. A. (2011). Cloudlines: Compact display of event episodes in multiple time-series. IEEE Transactions on Visualization and Computer Graphics, 17(12), 2432–2439.CrossRef
20.
Zurück zum Zitat Shi, C., Cui, W., Liu, S., & Xu, P. (2012). RankExplorer: visualization of ranking changes in large time series data. IEEE Transactions on Visualization and Computer Graphics, 18(12), 2669–2678.CrossRef Shi, C., Cui, W., Liu, S., & Xu, P. (2012). RankExplorer: visualization of ranking changes in large time series data. IEEE Transactions on Visualization and Computer Graphics, 18(12), 2669–2678.CrossRef
21.
Zurück zum Zitat Chen, Y., Hu, H., & Li, Z. (2013). Performance compare and optimazation of ractangular treemap layout algorithms. Journal of Computer-Aided Design & Computer Graphics, 25(11), 1623–1634. Chen, Y., Hu, H., & Li, Z. (2013). Performance compare and optimazation of ractangular treemap layout algorithms. Journal of Computer-Aided Design & Computer Graphics, 25(11), 1623–1634.
22.
Zurück zum Zitat Stoffel, F., Fischer, F., & Keim, D. A. (2013). Finding anomalies in time-series using visual correlation for interactive root cause analysis. In Proceedings of the Tenth Workshop on Visualization for Cyber Security ACM (pp. 65–72). Stoffel, F., Fischer, F., & Keim, D. A. (2013). Finding anomalies in time-series using visual correlation for interactive root cause analysis. In Proceedings of the Tenth Workshop on Visualization for Cyber Security ACM (pp. 65–72).
23.
Zurück zum Zitat Choi, H., Lee, H., & Kim, H. (2009). Fast detection and visualization of network attacks on parallel coordinates. Computers Security, 28(5), 276–288.CrossRef Choi, H., Lee, H., & Kim, H. (2009). Fast detection and visualization of network attacks on parallel coordinates. Computers Security, 28(5), 276–288.CrossRef
Metadaten
Titel
Seeflow: A Visualization System Using 2T Hybrid Graph for Characteristics Analysis of Abnormal Netflow
verfasst von
Sheng Zhang
Ronghua Shi
Jue Zhao
Publikationsdatum
21.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5808-0

Weitere Artikel der Ausgabe 4/2018

Wireless Personal Communications 4/2018 Zur Ausgabe

Neuer Inhalt