Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization
نویسندگان
چکیده
When given the task of securing a network, security analysts and network administrators typically face large volumes of security data that demand analysis. Selectively mapping elements of these flows to carefully crafted graphical displays can provide rapid insights while, at the same time, actively countering information overload. To this end, we present a generic framework for designing such visualization systems as well as results from the end-to-end design and implementation of two highly interactive systems. The first system focuses on increasing the utility of intrusion detection systems by providing information rich displays of network alerts. The second system provides new methods of visualizing network packets that enable the analyst to efficiently and effectively explore network traffic for malicious activity. To support our findings, we present the results of a user requirements study, which we used to base our designs, and an evaluation of our completed systems by professional security analysts. CR
منابع مشابه
Real-Time Virus Detection System Using iNetmon Engine
The fundamental problem with any network administration systems today is its ability to cope with the rising amount of virus intrusions. Currently available systems are only able to detect a virus after the network has been infected, therefore its non-real time. Depending on the malicious activities of the viruses, the detection will be carried out. Herewith, we are proposing a Real-Time Virus ...
متن کاملAn Automatic Alert Unification Method for Heterogeneous Alert Signatures
Several monitoring systems are usually composed by heterogeneous monitoring sensors. Each sensor raises thousands of alerts to be saved and analyzed in a centralized station. Most of alerts raised by different sensors are almost the same but have various formats and various descriptions. The system administrator must identify manually similar alerts in order to decrease the number of generated ...
متن کاملNetwork (In)Security Through IP Packet Filtering
t for improving network security. Used properly, packet filtering is a useful tool for he security-conscious network administrator, but its effective use requires a e p thorough understanding of its capabilities and weaknesses, and of the quirks of th articular protocols that filters are being applied to. This paper examines the utility t fi of IP packet filtering as a network security measure,...
متن کاملResults and Lessons Learned from a User Study of Display Effectiveness with Experienced Cyber Security Network Analysts
Background. Visualization tools have been developed for various network analysis tasks for Computer Network Defense (CND) analysts, yet there are few empirical studies in the domain of cyber security that validate the efficacy of various graphical constructions with respect to enhancing analysts’ situation awareness. Aim. The aim of this study is to empirically evaluate the utility of graphical...
متن کاملReliably Determining the Outcome of Computer Network Attacks
Organizations frequently rely on the use of Network Intrusion Detection Systems (NIDSs) to identify and prevent intrusions into their computer networks. While NIDSs have proven reasonably successful at detecting attacks, they have fallen short in determining if attacks succeed or fail. This determination is often left to the security analyst or system administrator. Large-scale networks pose a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005