A Dynamic Three-Dimensional Network Visualization Program for Integration into CyberCIEGE and Other Network Visualization Scenarios

Abstract : Detailed information and intellectual understanding of a network's topology and vulnerabilities is invaluable to better securing computer networks. Network protocol analyzers and intrusion detection systems can provide this additional information. In particular, game-based trainers, such as CyberCIEGE, have been shown to improve the level of training and understanding of network security professionals. This thesis' objective is to enhance these applications by developing NTAV3D, or, Network Topology and Attack Visualizer (Three Dimensional). NTAV3D is a tool that displays network topology, vulnerabilities, and attacks in an interactive, three-dimensional environment. This augments the design and game play of CyberCIEGE by increasing game player interaction and data display. Additionally, NTAV3D can be expanded to provide this capability to network analysis and intrusion detection tools. Furthermore, NTAV3D expands on ideas and results from related work of the best ways to visualize network topology, vulnerabilities, and attacks. NTAV3D was created using open-source software technologies including Xj3D, X3D, Java, and XML. It is also one of the first applications to be built with only the Xj3D toolkit. Therefore, the development process allowed evaluation of these technologies, resulting in recommendations for future improvements.

[1]  V. Rao Vemuri,et al.  Detecting And Visualizing Denial-of-Service And Network Probe Attacks Using Principal Component Analysis , 2005 .

[2]  Xiaohong Yuan,et al.  LAN attacker: a visual education tool , 2006, InfoSecCD '06.

[3]  Allan R. Wilks,et al.  Visualizing Network Data , 1995, IEEE Trans. Vis. Comput. Graph..

[4]  Qiang Chen,et al.  Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[5]  Clifford Berg High-Assurance Design: Architecting Secure and Reliable Enterprise Applications , 2005 .

[6]  T. Tidwell,et al.  Modeling Internet Attacks , 2022 .

[7]  George Kesidis,et al.  Visual toolkit for network security experiment specification and data analysis , 2006, VizSEC '06.

[8]  Aaron Kershenbaum,et al.  Visualization of network structures , 2005 .

[9]  Allan R. Wilks,et al.  Dynamic graphics for network visualization , 1990, Proceedings of the First IEEE Conference on Visualization: Visualization `90.

[10]  Kenneth C. Cox,et al.  3D geographic network displays , 1996, SGMD.

[11]  Peter R. Keller,et al.  Visual cues - practical data visualization , 1993 .

[12]  Deborah Estrin,et al.  Network Visualization with Nam, the VINT Network Animator , 2000, Computer.

[13]  Kofi Nyarko,et al.  Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration , 2002, Proceedings 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. HAPTICS 2002.

[14]  H. Gardner,et al.  Frames of Mind: The Theory of Multiple Intelligences , 1983 .

[15]  Ewan D. Tempero,et al.  A framework for interactive web-based visualization , 2006, AUIC.

[16]  Robert F. Erbacher Glyph-based generic network visualization , 2002, IS&T/SPIE Electronic Imaging.

[17]  Hyogon Kim,et al.  Real-time visualization of network attacks on high-speed links , 2004, IEEE Network.

[18]  Qiang Chen,et al.  Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.

[19]  John Hale,et al.  A systematic approach to multi-stage network attack analysis , 2004, Second IEEE International Information Assurance Workshop, 2004. Proceedings..

[20]  Christopher Leckie,et al.  Efficient visualization of large routing topologies , 2004 .

[21]  Cynthia E. Irvine,et al.  Cyber Security Training and Awareness Through Game Play , 2006, SEC.

[22]  Ganesh S. Oak Information Visualization Introduction , 2022 .

[23]  Graham J. Wills,et al.  Navigating large networks with hierarchies , 1993, Proceedings Visualization '93.

[24]  Stephen G. Eick,et al.  Aspects of network visualization , 1996, IEEE Computer Graphics and Applications.

[25]  Shigeyuki Matsuda,et al.  Tracing Network Attacks to Their Sources , 2002, IEEE Internet Comput..

[26]  Bernd Meyer,et al.  Self-Organizing Graphs - A Neural Network Perspective of Graph Layout , 1998, GD.