Visual exploration of network hostile behavior

Jorge Guerra, Carlos Adrián Catania, Eduardo Veas

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

This paper presents a graphical interface to identify hostile behavior in network logs. The problem of identifying and labeling hostile behavior is well known in the network security community. There is a lack of labeled datasets, which make it difficult to deploy automated methods or to test the performance of manual ones. We describe the process of searching and identifying hostile behavior with a graphical tool derived from an open source Intrusion Prevention System, which graphically encodes features of network connections from a log-file. A design study with two network security experts illustrates the workflow of searching for patterns descriptive of unwanted behavior and labeling occurrences therewith.
Originalspracheenglisch
TitelProceedings of the 2017 ACM Workshop on Exploratory Search and Interactive Data Analytics
Herausgeber (Verlag)Association of Computing Machinery
Seiten51-54
Seitenumfang4
ISBN (elektronisch)978-145034903-1
DOIs
PublikationsstatusVeröffentlicht - 2017
VeranstaltungACM Workshop on Exploratory Search and Interactive Data Analytics: ESIDA 2017 - Limassol, Zypern
Dauer: 13 März 2017 → …

Workshop

WorkshopACM Workshop on Exploratory Search and Interactive Data Analytics
Land/GebietZypern
OrtLimassol
Zeitraum13/03/17 → …

Fingerprint

Untersuchen Sie die Forschungsthemen von „Visual exploration of network hostile behavior“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren