Contextual network navigation to provide situational awareness for network administrators

作者: Cameron C. Gray , Panagiotis D. Ritsos , Jonathan C. Roberts

DOI: 10.1109/VIZSEC.2015.7312769

关键词:

摘要: One of the goals network administrators is to identify and block sources attacks from a steam. Various tools have been developed help administrator IP or subnet be blocked, however these tend non-visual. Having good perception wider can aid their origin, but while maps Internet useful for such endeavors, they are difficult construct, comprehend even utilize in an attack, often referred as being “hairballs”. We present visualization technique that displays pathways back attacker; we include all potential routing paths with best-efforts identification commercial relationships involved. These two techniques potentially highlight common and/or networks allow faster, more complete resolution incident, well fragile incomplete to/from network. They re-profile choice transit suppliers better serve target audience.

参考文章(40)
Michael Peterson, Maps and the Internet Maps and the Internet. pp. 1- 16 ,(2003) , 10.1016/B978-008044201-3/50003-7
J. Pearlman, P. Rheingans, Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective visualization for computer security. pp. 131- 146 ,(2008) , 10.1007/978-3-540-78243-8_9
K. Lakkaraju, R. Bearavolu, A. Slagell, W. Yurcik, S. North, Closing-the-loop in NVisionIP: integrating discovery and search in security visualizations visualization for computer security. pp. 9- 9 ,(2005) , 10.1109/VIZSEC.2005.3
H. Koike, K. Ohno, K. Koizumi, Visualizing cyber attacks using IP matrix visualization for computer security. pp. 11- 11 ,(2005) , 10.1109/VIZSEC.2005.22
Giuseppe Di Battista, Federico Mariani, Maurizio Patrignani, Maurizio Pizzonia, BGPlay: A System for Visualizing the Interdomain Routing Evolution graph drawing. ,vol. 2912, pp. 295- 306 ,(2003) , 10.1007/978-3-540-24595-7_27
V. Cerf, Y. Dalal, C. Sunshine, Specification of Internet Transmission Control Program RFC. ,vol. 675, pp. 1- 70 ,(1974)
S. Noel, M. Jacobs, P. Kalapa, S. Jajodia, Multiple coordinated views for network attack graphs visualization for computer security. pp. 12- 12 ,(2005) , 10.1109/VIZSEC.2005.14
Jubin Edachery, Arunabha Sen, Franz J. Brandenburg, Graph Clustering Using Distance-k Cliques graph drawing. pp. 98- 106 ,(1999) , 10.1007/3-540-46648-7_10
A. Danesh, L. Trajkovic, S.H. Rubin, M.H. Smith, Mapping the Internet joint ifsa world congress and nafips international conference. ,vol. 2, pp. 687- 692 ,(2001) , 10.1109/NAFIPS.2001.944685
S. Mathew, R. Giomundo, S. Upadhyaya, M. Sudit, A. Stotz, Understanding multistage attacks by attack-track based visualization of heterogeneous event streams Proceedings of the 3rd international workshop on Visualization for computer security - VizSEC '06. pp. 1- 6 ,(2006) , 10.1145/1179576.1179578