Intrusion behavior detection through visualization
نویسنده
چکیده
As computer and network intrusions become more and more of a concern, the need for better capabilities to assist in the detection and analysis of intrusions also increases. We propose a methodology for analyzing network and computer log information visually based on the analysis of user behavior. Each user’s behavior is the key to determining their intent and overriding goals, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate goal, which hinders the reliability of log file analysis. Visually analyzing the user’s behavior, however, is much more adaptable and difficult to counteract. This paper will discuss how user behavior can be exhibited within the visualization techniques, the capabilities provided by the environment, typical characteristics users should look out for (i.e., how unusual behavior exhibits itself), and exploration paradigms effective for identifying the meaning behind the user’s behavior.
منابع مشابه
Visualization of IDS data by HeiankyoView: 2nd report
IDS (Intrusion Detection System) is an active research topic for the purpose of cost reduction of security maintenance of computer network. However, existing IDS technologies still have some issues, including enormous log output data, and lack of analysis technologies of complicated behavior of recent intrusions. We proposed a visualization of IDS data, which constructs hierarchical data accord...
متن کاملVisualization Techniques for Intrusion Detection – a Survey
In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the task of detecting intrusions is becoming an increasingly difficult. Efficient information visualization is an important element required for urgent detection of i...
متن کاملVisualization of Abnormal Behavior Detection using Parallel Coordinate and Correspondence Analysis
Most of the network management part, especially a network security needs effective visualization methods for flooding connections. Because many web systems using huge users are suffering from huge normal connections with flooding attacks. Also, most of the connection cases have to be monitored for intrusion detection including any kinds of abnormal connection cases. Therefore, in this paper we ...
متن کاملVisualizing Network Anomalies for Intrusion Detection with Information Theoretic Metrics∗
Intrusion detection is a common and critical part of networks given the increasing severity and frequency of attacks on computer systems. Recently, information theoretic metrics have been used in intrusion detection to find anomalies in traffic that may indicate the presence of attacks and covert channels in the network. We develop a visualization that leverages information theoretic metrics su...
متن کاملDesigning an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملData Visualization Technique Framework for Intrusion detection
Network attacks have become the fundamental threat to today's largely interconnected computer system. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. While a number of information visualization software frameworks exist, creating new visualizations, especially those that involve novel visualization metaphors, interaction techniqu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003