Multi-Resolution Analysis with Visualization to Determine Network Attack Patterns
نویسندگان
چکیده
Analyzing network traffic activities is imperative in security to detect attack patterns. Due the complex nature of event caused by continuously changing computing environments and software applications, identifying patterns one challenging research topics. This study focuses on analyzing effectiveness integrating Multi-Resolution Analysis (MRA) visualization activities. In detail, a Discrete Wavelet Transform (DWT) utilized extract features from data investigate their capability attacks. For extracting features, various sliding windows step sizes are tested. Then, visualizations generated help users conduct interactive visual analyses identify abnormal events. To determine optimal solutions for generating visualizations, an extensive evaluation with multiple intrusion detection datasets has been performed. addition, classification analysis three different algorithms managed understand using MRA visualization. From study, we associated window emphasize proposed approach differentiating normal events forming distinctive clusters. We also found that utilizing advances clearly separated
منابع مشابه
Constructing multi-resolution triangulated irregular network model for visualization
It is essential to generate multi-resolution triangulated irregular network (TIN) models dynamically and efficiently in three-dimensional (3D) visualization, virtual reality (VR), and geographic information systems (GIS), because the data processed is multiple in scale and large in volume. This paper proposes a new approach, which extends the iterative edge collapses and vertex splits algorithm...
متن کاملVisualization Of A Data Leak How Can Visualization Assist To Determine The Scope Of An Attack?
The potential impact that data leakage can have on a country, both on a national level as well as on an individual level, can be wide reaching and potentially catastrophic. In January 2013, several South African companies became the target of a hack attack, resulting in the breach of security measures and the leaking of a claimed 700000 records. The affected companies are spread across a number...
متن کاملDiscovering Collaborative Cyber Attack Patterns Using Social Network Analysis
This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments...
متن کاملA General Framework for Multi-Resolution Visualization
Multi-resolution visualization (MRV) systems are widely used for handling large amounts of information. These systems look different but they share many common features. The visualization research community lacks a general framework that summarizes the common features among the wide variety of MRV systems in order to help in MRV system design, analysis, and enhancement. This dissertation propos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13063792