skip to main content
10.1145/1029208.1029219acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

NVisionIP: netflow visualizations of system state for security situational awareness

Authors Info & Claims
Published:29 October 2004Publication History

ABSTRACT

The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble keeping on top of the current state of their networks. In this paper, we describe a tool called NVisionIP that is designed to increase the security analyst's situational awareness. As humans are inherently visual beings, NVisionIP uses a graphical representation of a class-B network to allow analysts to quickly visualize the current state of their network. We present an overview of NVisionIP along with a discussion of various types of security-related scenarios that it can be used to detect.

References

  1. Argus -- metrics. Web Page, Mar. 2001. h http://www.qosient.com/argus/metrics.htm i.Google ScholarGoogle Scholar
  2. Ratna Bearavolu, Kiran Lakkaraju, William Yurcik, and Hrishikesh Raje. A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks. In IEEE Military Communications Conference (Milcom), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. CERT/CC Statistics 1988--2003, Jan. 2004. h http://www.cert.org/stats/i. (Jun. 2004).Google ScholarGoogle Scholar
  4. Martin Dodge and Rob Kitchin. Atlas of Cyberspace. Addison Wesley, Harlow, England, 2001.Google ScholarGoogle Scholar
  5. Jana Dunn. Security applications for cisco net ow data. Technical report, SANS, Jul. 2001. h http: //www.sans.org/rr/papers/index.php?id=778 i.Google ScholarGoogle Scholar
  6. Robert F. Erbacher and Deborah Frincke. Visual behavior characterization for intrusion and misuse detection. In SPIE '2001 Conference on Visual Data Exploration and Analysis VIII, pages 210--218, Jan. 2001.Google ScholarGoogle Scholar
  7. Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke. Intrusion and misuse detection in large-scale systems. Computer Graphics and Applications, 22(1):38--48, Jan.--Feb. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mark Fullmer and Steve Romig. The osu ow-tools package and cisco net ow logs. In 14th Systems Administration Conference (LISA 2000), Dec. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. NCSA Automated Learning Group. D2K Toolkit User Manual. National Center for Supercomputing Applications, Apr. 2003. h http: //algdocs.ncsa.uiuc.edu/TU-20030425-1.pdf i .Google ScholarGoogle Scholar
  10. Gene H. Kim and Eugene H. Spafford. The design and implementation of tripwire: a file system integrity checker. In Proceedings of the 2nd ACM Conference on Computer and communications security, pages 18--29. ACM Press, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Samuel T. King and Peter M. Chen. Backtracking intrusions. In Proceedings of the 2003 Symposium on Operating Systems Principles (SOSP), Oct. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kiran Lakkaraju, Ratna Bearavolu, and William Yurcik. Nvisionip -- a traffic visualization tool for security analysis of large and complex networks. In International Multiconference on Measurement, Modelling, and Evaluation of Computer-Communications Systems Performance TOOLS, 2003.Google ScholarGoogle Scholar
  13. Kiran Lakkaraju, William Yurcik, Ratna Bearavolu, and Adam J. Lee. NVisionIP: An Interactive Network Flow Visualization Tool for Security. In IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2004.Google ScholarGoogle Scholar
  14. Stephen Lau. The spinning cube of potential doom. Communications of the ACM, 47(6):25--26, Jun. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. John-Paul Navarro, Bill Nickless, and Linda Winkler. Combining cisco net ow exports with relational database technology for usage statistics, intrusion detection, and network forensics. In 14th Systems Administration Conference (LISA 2000), Dec. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. The network simulator -- ns--2. Web Page, May 2004. h http://www.isi.edu/nsnam/ns/ i .Google ScholarGoogle Scholar
  17. OPNET Technologies, Inc. Web Page, Jun. 2004. h http://www.opnet.com i .Google ScholarGoogle Scholar
  18. Adam G. Pennington, John D. Strunk, John Linwood, Griffin, Craig A.N. Soules, Garth R. Goodson, and Gregory R. Ganger. Storage-based intrusion detection: Watching storage activity for suspicious behavior. In USENIX Security Symposium 2003, 2003. h http: //www.pdl.cmu.edu/PDL-FTP/Secure/usenix03.pdf i . Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Dave Plonka. Flowscan: A network traffic ow reporting and visualization tool. In 14th Systems Administration Conference (LISA 2000), Dec. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Secure decisions. Web Page, Jun. 2004. h http://www.securedecisions.com/ i .Google ScholarGoogle Scholar
  21. Ben Shneiderman. Tree visualization with tree-maps: 2-d space-filling approach. ACM Trans. Graph., 11(1):92--99, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Security incident fusion toolkit SIFT, Jun.Google ScholarGoogle Scholar
  23. CERT Advisory CA-2003-04 MS-SQL Server Worm. Web Page, Jan. 2003. h http: //www.cert.org/advisories/CA-2003-04.html i .Google ScholarGoogle Scholar
  24. Snort: The open source network intrusion detection system. Web Page, Jun. 2004. h http://www.snort.org i .Google ScholarGoogle Scholar
  25. Security threat manager. Web Page, Jun. 2004. h http://www.open.com/products/threatmanager/ threatmanager.shtml% i .Google ScholarGoogle Scholar
  26. Soon Tee Teoh, Kwan-Liu Ma, S. Felix Wu, and Xiaoliang Zhao. Case study: Interactive visualization for internet security. In IEEE Visualization, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Edward R. Tufte. The Visual Display of Quantitative Information. Graphics Press, P.O. Box 430, Cheshire, CT 06410, Second edition, Jan. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. United States Department of Homeland Security. Team Coordination Training, Student Guide, May 2004. h http://www.cgaux.info/g_ocx/training/tct/ i .Google ScholarGoogle Scholar
  29. Xiaoxin Yin, William Yurcik, Yifan Li, Kiran Lakkaraju, and Cristina Abad. Vis owconnect: Providing security situational awareness by visualizing network traffic ows. In Workshop on Information Assurance (WIA04) held in conjunction with the 23rd IEEE International Performance Computing and Communications Conference (IPCCC), 2004.Google ScholarGoogle Scholar
  30. William Yurcik, James Barlow, Kiran Lakkaraju, and Mike Haberman. Two visual computer network security monitoring tools incorporating operator interface. In ACM CHI Workshop on Human-Computer Interaction and Security Systems (HCISEC), 2003.Google ScholarGoogle Scholar
  31. William Yurcik, Kiran Lakkaraju, James Barlow, and Jeff Rosendale. A prototype tool for visual data mining of network traffic for intrusion detection. In 3rd IEEE International Conference on Data Mining (ICDM) Workshop on Data Mining for Computer Security (DMSEC), 2003.Google ScholarGoogle Scholar

Index Terms

  1. NVisionIP: netflow visualizations of system state for security situational awareness

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
          October 2004
          156 pages
          ISBN:1581139748
          DOI:10.1145/1029208

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 October 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader