Internet Security Visualization Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

نویسندگان

  • William Yurcik
  • Yifan Li
چکیده

With the development of the Internet and organizational intranets, it has become an increasingly critical and difficult task to monitor large and complex networks indispensable to security risk management and network performance analysis. Monitoring for security situational awareness with visualization has been shown to be an effective and efficient approach. However, the quality of source data for visualization tools directly determines resulting performance. In the security monitoring visualization tools developed at NCSA, diverse log files are employed, the most important ones being Cisco NetFlows and Argus NetFlows. Due to their uniform record format and distinctive level of abstraction over raw packets, NetFlows are increasingly used by security engineers to infer security events. In spite of the wide usage of NetFlows, there has only been limited work on the data management issues of using NetFlows as a unique data source. Although several popular tools have been developed for processing Cisco NetFlows, only NCSA and the University of Chicago have developed processing tools for Argus NetFlows. In addition, several prominent differences exist between Cisco NetFlows and Argus NetFlows. Lastly, with increasingly higher line rates, sampling appears to be the trend for minimizing router overhead and data overload. Sampling mechanisms employed by Cisco and sFlow are introduced, along with discussion of their possible effect on security analysis. This work is expected to provide practical insight into data management issues inherent with the use of NetFlows source data for security and network performance monitoring.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NetSecRadar: A Visualization System for Network Security Situational Awareness

Situational awareness is defined as the ability to effectively determine an overall computer network status based on relationships between security events in multiple dimensions. Unfortunately, as the lack of tools to synthetically analyze the security logs generated by kinds of network security products, such as NetFlow, Firewall and Host Security, it is difficult to monitor and perceive netwo...

متن کامل

Correlation between NetFlow System and Network Views for Intrusion Detection∗

We present several ways to correlate security events from two applications that visualize the same underlying data with two distinct views: system and network. Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections be...

متن کامل

Fast detection and visualization of network attacks on parallel coordinates

This article presents what we call the parallel coordinate attack visualization (PCAV) for detecting unknown large-scale Internet attacks including Internet worms, DDoS attacks and network scanning activities. PCAV displays network traffic on the plane of parallel coordinates using the flow information such as the source IP address, destination IP address, destination port and the average packe...

متن کامل

Methodological Primitives for Phased Construction of Data Visualization Models

The paper considers common methodological primitives for phased construction of data visualization models, which will help to create new graphical models of data security visualization, or will help to show advantages and disadvantages of existing models. The paper also considers examples of graphical models and additional tools, which allow to work with these models. The purpose of the paper i...

متن کامل

Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite

The first step in improving Internet security is measurement – security events must be made visible. The irony in making this happen is that there is no lack of security measurement data, in fact, quite the opposite. However, making security manifest faces a major challenge: the large volume and multi-dimensional nature of security data typically obscures valuable security events. NCSA has deve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005