Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Fast detection and visualization of network attacks on parallel coordinates

Authors
Choi, HyunsangLee, HeejoKim, Hyogon
Issue Date
Jul-2009
Publisher
ELSEVIER ADVANCED TECHNOLOGY
Keywords
Internet attack visualization; Parallel coordinates; Internet worms; DDoS attacks; Parallel coordinate attack visualization (PCAV)
Citation
COMPUTERS & SECURITY, v.28, no.5, pp.276 - 288
Indexed
SCIE
SCOPUS
Journal Title
COMPUTERS & SECURITY
Volume
28
Number
5
Start Page
276
End Page
288
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/119697
DOI
10.1016/j.cose.2008.12.003
ISSN
0167-4048
Abstract
This article presents what we call the parallel coordinate attack visualization (PCAV) for detecting unknown large-scale Internet attacks including Internet worms, DDoS attacks and network scanning activities. PCAV displays network traffic on the plane of parallel coordinates using the flow information such as the source IP address, destination IP address, destination port and the average packet length in a flow. The parameters are used to draw each flow as a connected line on the plane, where a group of polygonal lines form a particular shape in case of attack. From the observation that each attack type of significance forms a unique pattern, we develop nine signatures and their detection mechanism based on an efficient hashing algorithm. Using the graphical signatures, PCAV can quickly detect new attacks and enable network administrators to intuitively recognize and respond to the attacks. Compared with existing visualization works, PCAV can handle hyperdimensions, i.e., can visualize more than 3 parameters if necessary, which significantly reduces false positives. As a consequence, Internet worms are more precisely detectable by machine and more easily recognizable by human. Another strength of PCAV is handling flows instead of packets. Per-flow visualization greatly reduces the processing time and further provides compatibility with legacy routers which export flow information, e.g., as NetFlow does in Cisco routers. We demonstrate the effectiveness of PCAV using real-life Internet traffic traces. The PCAV program is publicly available. (C) 2008 Elsevier Ltd. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hee jo photo

Lee, Hee jo
Department of Computer Science and Engineering
Read more

Altmetrics

Total Views & Downloads

BROWSE