Data mining-based integrated network traffic visualization framework for threat detection

In this speedy and voluminous digital world, the threat detection and reporting are a challenging job for rapid action. The present study deals with a strong and viable solution to overcome different threats, network security using data mining approach and techniques through visual graphical representation. Current research study explained and proposed a novel approach named as ‘integrated network traffic visualization system’. Nevertheless, current framework is working and based on data mining, further help out to demonstrates two new visualization schemes called as: Firstly Grid and secondly Platter. Per framework results, the Grid view is capable of displaying network traffic in different classified grids, based on application layer protocols. Additionally, Platter view visualizes campus area wireless network traffic on a single screen mechanized automatically adjusted with network size. These active schemes are significantly effective to identify and monitor the compromised machines and cuts down reaction time.

[1]  Chris North,et al.  Home-centric visualization of network traffic for security administration , 2004, VizSEC/DMSEC '04.

[2]  Deborah Estrin,et al.  Network Visualization with Nam, the VINT Network Animator , 2000, Computer.

[3]  Chris North,et al.  Visual correlation of host processes and network traffic , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..

[4]  Christopher Westphal Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies , 2008 .

[5]  Jill Slay,et al.  The "Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation , 2010, 2010 International Conference on Availability, Reliability and Security.

[6]  Ehab Al-Shaer,et al.  Analysis of Firewall Policy Rules Using Data Mining Techniques , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[7]  William Yurcik,et al.  NVisionIP: netflow visualizations of system state for security situational awareness , 2004, VizSEC/DMSEC '04.

[8]  Bianchi Serique Meiguins,et al.  PRISMA - A Multidimensional Information Visualization Tool Using Multiple Coordinated Views , 2007, 2007 11th International Conference Information Visualization (IV '07).

[9]  Edward Swing Flodar: Flow Visualization of Network Traffic , 1998, IEEE Computer Graphics and Applications.

[10]  John R. Goodall,et al.  VIAssist: Visual analytics for cyber defense , 2009, 2009 IEEE Conference on Technologies for Homeland Security.

[11]  Cristian Estan,et al.  Interactive Traffic Analysis and Visualization with Wisconsin Netpy , 2005, LISA.

[12]  Iftikhar Ahmad,et al.  Application of artificial neural network in detection of probing attacks , 2009, 2009 IEEE Symposium on Industrial Electronics & Applications.

[13]  Yifan Li,et al.  VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.

[14]  A. L. Narasimha Reddy,et al.  NetViewer: A Network Traffic Visualization and Analysis Tool , 2005, LISA.

[15]  John T. Stasko,et al.  IDS rainStorm: visualizing IDS alarms , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..

[16]  John McHugh,et al.  FloVis: Flow Visualization System , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.

[17]  Manish Karir,et al.  Flamingo: Visualizing Internet Traffic , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[18]  Barry Irwin,et al.  InetVis, a visual tool for network telescope traffic analysis , 2006, AFRIGRAPH '06.

[19]  Ben Shneiderman,et al.  The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.

[20]  Sadie Creese,et al.  CyberVis: Visualizing the potential impact of cyber attacks on the wider enterprise , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[22]  Mayank Pal Singh,et al.  Visualization of flow data based on clustering technique for identifying network anomalies , 2009, 2009 IEEE Symposium on Industrial Electronics & Applications.

[23]  Mao Lin Huang,et al.  A new concentric-circle visualization of multi-dimensional data and its application in network security , 2010, J. Vis. Lang. Comput..

[24]  Colin Ware,et al.  Information Visualization: Perception for Design , 2000 .

[25]  Zhang Jiawan,et al.  A Novel Visualization Approach for Efficient Network Scans Detection , 2008, 2008 International Conference on Security Technology.

[26]  Risto Vaarandi Real-time classification of IDS alerts with data mining techniques , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.