Advertisement

Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection

  • Travis Atkison
  • Kathleen Pensy
  • Charles Nicholas
  • David Ebert
  • Rebekah Atkison
  • Chris Morris
Part of the Eurographics book series (EUROGRAPH)

Abstract

We describe our efforts to analyze network intrusion detection data using information retrieval and visualization tools. By regarding Telnet sessions as documents, which may or may not include attacks, a session that contains a certain type of attack can be used as a query, allowing us to search the data for other instances of that same type of attack. The use of information visualization techniques allows us to quickly and clearly find the attacks and also find similar, potentially new types of attacks.

Keywords

Information Retrieval Intrusion Detection Information Visualization Network Attack Information Retrieval Technique 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [CUNN99]
    R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall, S. E. Webster, D. Wyschogrod, M. A. Zissman, “Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation,” SANS, 1999.Google Scholar
  2. [EBER96]
    Ebert, D., Shaw, C, Zwa, A., and Starr, C. “Two-handed Interactive Stereoscopic Visualization,” IEEE Visualization’ 96 1996.Google Scholar
  3. [EBER97]
    Ebert, D, Kukla, J., Shaw, C, Zwa, A., Soboroff, I., and Roberts, DA., “Automatic Shape Interpolation for Glyph-based Information Visualization,” IEEE Visualization 97 Late Breaking Hot Topics, October 1997, Phoenix, AZ.Google Scholar
  4. [KEND99]
    K. Kendall, “A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems”, S. M. Thesis, MIT Department of Electrical Engineering and Computer Science, June 1999.Google Scholar
  5. [LIPPOO]
    Richard P. Lippmann, David J. Fried, Isaac Graf, Joshua W. Haines, Kristopher R. Kendall, David McClung, Dan Weber, Seth E. Webster, Dan Wyschogrod, Robert K. Cunningham, and Marc A. Zissman, “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation,” in Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000, Vol 2.Google Scholar
  6. [MILL99]
    Ethan L. Miller, Dan Shen, Junli Liu, Charles Nicholas, and Ting Chen, “Techniques for Gigabyte-Scale N-gram Based Information Retrieval on Personal Computers,” Proceedings of the 1999 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA’ 99), Las Vegas, NV.Google Scholar
  7. [MYSQL] “MySQL Reference Manual”, http://www.mysql.com/documentation/index.html
  8. [PEAR97]
    Claudia Pearce and Ethan Miller, “The TELLTALE Dynamic Hypertext Environment: Approaches to Scalability,” in Advances in Intelligent Hypertext, J. Mayfield and C. Nicholas, eds. Lecture Notes in Computer Science 1326, Springer-Verlag.Google Scholar

Copyright information

© Springer-Verlag Wien 2001

Authors and Affiliations

  • Travis Atkison
    • 1
  • Kathleen Pensy
    • 1
  • Charles Nicholas
    • 1
  • David Ebert
    • 1
  • Rebekah Atkison
    • 1
  • Chris Morris
    • 1
  1. 1.Computer Science and Electrical Engineering DepartmentUniversity of Maryland, Baltimore CountyBaltimoreUK

Personalised recommendations