TY - CHAP
T1 - VisFlowCluster-IP
T2 - Connectivity-based visual clustering of network hosts
AU - Yin, Xiaoxin
AU - Yurcik, William
AU - Slagell, Adam
N1 - Funding Information:
As fully automated intrusion detection systems have not been able to provide a highly effective solution to protect network systems, humans are still in-the-loop of * This research was supported in part by a grant from the Office of Naval Research (ONR) under the auspices of the National Center for Advanced Secure Systems Research (NCASSR) <h ttp://www.ncassr.org>.
PY - 2006
Y1 - 2006
N2 - With the increasing number of hostile network attacks, anomaly detection for network security has become an urgent task. As there have not been highly effective solutions for automatic intrusion detection, especially for detecting newly emerging attacks, network traffic visualization has become a promising technique for assisting network administrators to monitor network traffic and detect abnormal behaviors. In this paper we present VisFlowCluster-IP, a powerful tool for visualizing network traffic flows using network logs. It models the network as a graph by modeling hosts as graph nodes. It utilizes the force model to arrange graph nodes on a two-dimensional space, so that groups of related nodes can be visually clustered in a manner apparent to human eyes. We also propose an automated method for finding clusters of closely connected hosts in the visualization space. We present three real cases that validate the effectiveness of VisFlowCluster-IP in identifying abnormal behaviors.
AB - With the increasing number of hostile network attacks, anomaly detection for network security has become an urgent task. As there have not been highly effective solutions for automatic intrusion detection, especially for detecting newly emerging attacks, network traffic visualization has become a promising technique for assisting network administrators to monitor network traffic and detect abnormal behaviors. In this paper we present VisFlowCluster-IP, a powerful tool for visualizing network traffic flows using network logs. It models the network as a graph by modeling hosts as graph nodes. It utilizes the force model to arrange graph nodes on a two-dimensional space, so that groups of related nodes can be visually clustered in a manner apparent to human eyes. We also propose an automated method for finding clusters of closely connected hosts in the visualization space. We present three real cases that validate the effectiveness of VisFlowCluster-IP in identifying abnormal behaviors.
UR - http://www.scopus.com/inward/record.url?scp=33845521036&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33845521036&partnerID=8YFLogxK
U2 - 10.1007/0-387-33406-8_24
DO - 10.1007/0-387-33406-8_24
M3 - Chapter
AN - SCOPUS:33845521036
SN - 038733405X
SN - 9780387334059
T3 - IFIP International Federation for Information Processing
SP - 284
EP - 295
BT - Security and Privacy in Dynamic Environments
A2 - Fischer-Hubner, Simone
A2 - Lindskog, Stefan
A2 - Lassous, Guerin
A2 - Yngstrom, Louise
ER -