메뉴 건너뛰기




Volumn , Issue , 2015, Pages 37-42

Visualizing traffic causality for analyzing network anomalies

Author keywords

Anomaly detection; Information visualization; Network traffic analysis; Usable security; Visual locality

Indexed keywords

ANOMALY DETECTION; COMPLEX NETWORKS; INFORMATION SYSTEMS; KNOWLEDGE MANAGEMENT; MALWARE;

EID: 84928319653     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2713579.2713583     Document Type: Conference Paper
Times cited : (30)

References (25)
  • 1
    • 80054978961 scopus 로고    scopus 로고
    • Traffic Causality Graphs: Profiling network applications through temporal and spatial causality of flows
    • H. Asai, K. Fukuda, and H. Esaki. Traffic Causality Graphs: Profiling network applications through temporal and spatial causality of flows. In ITC'11, pages 95-102, 2011.
    • (2011) ITC'11 , pp. 95-102
    • Asai, H.1    Fukuda, K.2    Esaki, H.3
  • 2
    • 78149456361 scopus 로고    scopus 로고
    • Real-time visualization of network behaviors for situational awareness
    • D. M. Best, S. Bohn, D. Love, A. Wynne, and W. A. Pike. Real-time visualization of network behaviors for situational awareness. In VizSec'10, pages 79-90, 2010.
    • (2010) VizSec'10 , pp. 79-90
    • Best, D.M.1    Bohn, S.2    Love, D.3    Wynne, A.4    Pike, W.A.5
  • 3
    • 84894529357 scopus 로고    scopus 로고
    • TVi: A visual querying system for network monitoring and anomaly detection
    • A. Boschetti, L. Salgarelli, C. Muelder, and K.-L. Ma. TVi: a visual querying system for network monitoring and anomaly detection. In VizSec'11, page 1, 2011.
    • (2011) VizSec'11 , pp. 1
    • Boschetti, A.1    Salgarelli, L.2    Muelder, C.3    Ma, K.-L.4
  • 4
    • 85076921594 scopus 로고    scopus 로고
    • Automating network application dependency discovery: Experiences, limitations, and new solutions
    • X. Chen, M. Zhang, Z. M. Mao, and P. Bahl. Automating network application dependency discovery: Experiences, limitations, and new solutions. In OSDI'08, pages 117-130.
    • OSDI'08 , pp. 117-130
    • Chen, X.1    Zhang, M.2    Mao, Z.M.3    Bahl, P.4
  • 7
    • 33749537716 scopus 로고    scopus 로고
    • Visual correlation of host processes and network traffic
    • G. A. Fink, P. Muessig, and C. North. Visual correlation of host processes and network traffic. In VizSec'05, page 2, 2005.
    • (2005) VizSec'05 , pp. 2
    • Fink, G.A.1    Muessig, P.2    North, C.3
  • 8
    • 70450078118 scopus 로고    scopus 로고
    • Vulnerability & attack injection for web applications
    • J. Fonseca, M. Vieira, and H. Madeira. Vulnerability & attack injection for web applications. In DSN'09, pages 93-102, 2009.
    • (2009) DSN'09 , pp. 93-102
    • Fonseca, J.1    Vieira, M.2    Madeira, H.3
  • 9
    • 77949384586 scopus 로고    scopus 로고
    • Visualization is better! A comparative evaluation
    • J. R. Goodall. Visualization is better! A comparative evaluation. In VizSec'09, pages 57-68, 2009.
    • (2009) VizSec'09 , pp. 57-68
    • Goodall, J.R.1
  • 11
    • 35948940663 scopus 로고    scopus 로고
    • Monitoring network traffic with radial traffic analyzer
    • D. A. Keim, F. Mansmann, J. Schneidewind, and T. Schreck. Monitoring network traffic with radial traffic analyzer. In VAST'06, pages 123-128, 2006.
    • (2006) VAST'06 , pp. 123-128
    • Keim, D.A.1    Mansmann, F.2    Schneidewind, J.3    Schreck, T.4
  • 12
    • 85180415006 scopus 로고    scopus 로고
    • Enriching intrusion alerts through multi-host causality
    • S. T. King, Z. M. Mao, D. G. Lucchetti, and P. M. Chen. Enriching intrusion alerts through multi-host causality. In NDSS'05, 2005.
    • (2005) NDSS'05
    • King, S.T.1    Mao, Z.M.2    Lucchetti, D.G.3    Chen, P.M.4
  • 13
    • 20444456753 scopus 로고    scopus 로고
    • SnortView: Visualization system of Snort logs
    • H. Koike and K. Ohno. SnortView: Visualization system of Snort logs. In VizSEC/DMSEC'04, pages 143-147, 2004.
    • (2004) VizSEC/DMSEC'04 , pp. 143-147
    • Koike, H.1    Ohno, K.2
  • 14
    • 85076740771 scopus 로고    scopus 로고
    • WebProphet: Automating performance prediction for web services
    • Z. Li, M. Zhang, Z. Zhu, Y. Chen, A. G. Greenberg, and Y.-M. Wang. WebProphet: Automating performance prediction for web services. In NSDI'10, pages 143-158, 2010.
    • (2010) NSDI'10 , pp. 143-158
    • Li, Z.1    Zhang, M.2    Zhu, Z.3    Chen, Y.4    Greenberg, A.G.5    Wang, Y.-M.6
  • 17
    • 84862606327 scopus 로고    scopus 로고
    • A survey of visualization systems for network security
    • H. Shiravi, A. Shiravi, and A. A. Ghorbani. A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph., 18(8):1313-1329, 2012.
    • (2012) IEEE Trans. Vis. Comput. Graph , vol.18 , Issue.8 , pp. 1313-1329
    • Shiravi, H.1    Shiravi, A.2    Ghorbani, A.A.3
  • 18
    • 84881081209 scopus 로고    scopus 로고
    • Crucial nodes centric visual monitoring and analysis of computer networks
    • H. Song, C. Muelder, and K.-L. Ma. Crucial nodes centric visual monitoring and analysis of computer networks. In CyberSecurity, pages 16-23, 2012.
    • (2012) CyberSecurity , pp. 16-23
    • Song, H.1    Muelder, C.2    Ma, K.-L.3
  • 20
    • 81055138290 scopus 로고    scopus 로고
    • Detecting infection onset with behavior-based policies
    • K. Xu, D. Yao, Q. Ma, and A. Crowell. Detecting infection onset with behavior-based policies. In NSS'11, pages 57-64.
    • NSS'11 , pp. 57-64
    • Xu, K.1    Yao, D.2    Ma, Q.3    Crowell, A.4
  • 21
    • 84874838079 scopus 로고    scopus 로고
    • Cross-layer detection of malicious websites
    • L. Xu, Z. Zhan, S. Xu, and K. Ye. Cross-layer detection of malicious websites. In CODASPY'13, pages 141-152, 2013.
    • (2013) CODASPY'13 , pp. 141-152
    • Xu, L.1    Zhan, Z.2    Xu, S.3    Ye, K.4
  • 22
    • 56749157072 scopus 로고    scopus 로고
    • Visualization of rule-based programming
    • W. Yu and R. M. Verma. Visualization of rule-based programming. In SAC'08, pages 1258-1259, 2008.
    • (2008) SAC'08 , pp. 1258-1259
    • Yu, W.1    Verma, R.M.2
  • 25
    • 84984908573 scopus 로고    scopus 로고
    • Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery
    • H. Zhang, D. Yao, and N. Ramakrishnan. Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. In ASIACCS'14, pages 39-50, 2014.
    • (2014) ASIACCS'14 , pp. 39-50
    • Zhang, H.1    Yao, D.2    Ramakrishnan, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.