This paper presents an iterative visualization technique including the timeline and parallel coordinates to illustrate network communication for forensic analysis. In primarily analysis process, the timeline of events is reconstructed from traffic logs. An analyst can track the related anomaly event on-demand. In addition the details of abnormal and normal activities are shown in multiple dimensions of parallel coordinates. The novelty of this research is not a presentation of the timeline and parallel coordinates technique, but iterative visualization framework to illustrate both anomaly traffic and application traffic pattern. We applied frequent item-set mining to search dominant traffic flow and classify them by traffic flow shape and entropy. Although some studies have been applied frequent item-set mining with traffic dataset, but as we have known, this is the first research to 1) take advantages of the frequent item-set mining and parallel coordinates, which allow us to find both the anomaly traffic and application traffic and it can easily understand the patterns of traffic flow with the multi-dimensional visualization, and 2) classify the application traffic from the entropy values of traffic flow discovered by frequent item-set mining. This method is able to classify the encrypted traffic data and it does not violate a user privacy. The results of this research and development of a visual network communication tool can: 1) show abnormalities and normal communication activities, 2) have application traffic classification 92% accurate, 3) be a visual network communication prototype which helps an analyst to find the cause of the network malfunction.
[1]
Kavé Salamatian,et al.
Anomaly extraction in backbone networks using association rules
,
2012,
TNET.
[2]
Bernhard Ager,et al.
Visualizing big network traffic data using frequent pattern mining and hypergraphs
,
2013,
Computing.
[3]
Michael Devetsikiotis,et al.
Flow classification using clustering and association rule mining
,
2010,
2010 15th IEEE International Workshop on Computer Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD).
[4]
Heejo Lee,et al.
Fast detection and visualization of network attacks on parallel coordinates
,
2009,
Comput. Secur..
[5]
Mark Crovella,et al.
Mining anomalies using traffic feature distributions
,
2005,
SIGCOMM '05.
[6]
Nuttachot Promrit,et al.
Multi-dimensional visualization for network forensic analysis
,
2011,
7th International Conference on Networked Computing.
[7]
Pere Barlet-Ros,et al.
Practical anomaly detection based on classifying frequent traffic patterns
,
2012,
2012 Proceedings IEEE INFOCOM Workshops.
[8]
Lior Rokach,et al.
Using the confusion matrix for improving ensemble classifiers
,
2010,
2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel.
[9]
Alfred Inselberg,et al.
Multidimensional detective
,
1997,
Proceedings of VIZ '97: Visualization Conference, Information Visualization Symposium and Parallel Rendering Symposium.