作者: Cameron C. Gray , Panagiotis D. Ritsos , Jonathan C. Roberts
DOI: 10.1109/VIZSEC.2015.7312769
关键词:
摘要: One of the goals network administrators is to identify and block sources attacks from a steam. Various tools have been developed help administrator IP or subnet be blocked, however these tend non-visual. Having good perception wider can aid their origin, but while maps Internet useful for such endeavors, they are difficult construct, comprehend even utilize in an attack, often referred as being “hairballs”. We present visualization technique that displays pathways back attacker; we include all potential routing paths with best-efforts identification commercial relationships involved. These two techniques potentially highlight common and/or networks allow faster, more complete resolution incident, well fragile incomplete to/from network. They re-profile choice transit suppliers better serve target audience.