• No results found

Monitoring Network Traffic with Radial Traffic Analyzer

N/A
N/A
Protected

Academic year: 2021

Share "Monitoring Network Traffic with Radial Traffic Analyzer"

Copied!
41
0
0

Loading.... (view fulltext now)

Full text

(1)

Monitoring Network Traffic

with Radial Traffic Analyzer

Daniel A. Keim     Florian Mansmann     Jörn Schneidewind     Tobias Schreck Stefan Heinz Seminar Visual Analytics IEEE Symposium on Visual Analytics Science and Technology, 2006

(2)

Motivation

● Internet has become the information medium of first  resort ● Each host on the network faces different threats in this  environment – Malicious code – Denial­of­service attacks – Attempts to hijack a machine

(3)

Motivation

localhost local network internet ● How can we identify such threats? ● What kind of data is transferred between my computer  and other computers on the network?

(4)

Motivation

Network Monitoring

Surveillance of important performance metrics

Goal: supervise functionality, detect and prevent 

potential problems, develop effective counter­

measures for anomalies and sabotage

(5)

Data Set

Communication data is complex ● Large amounts of data ● Real­time data ● Interrelationships between communication  connections ● Relationships may vary over time

(6)

Data Set – Technical Background

TCP / IP Reference Model 1Application Layer 2Presentation Layer 3Session Layer 4Transport Layer 5Network Layer 6Data Link Layer 7Physical Layer 1Application Layer 2Presentation Layer 3Session Layer 4Transport Layer 5Network Layer 6Data Link Layer 7Physical Layer

(7)

Data Set – Technical Background

TCP / IP Reference Model 1Application Layer 2Presentation Layer 3Session Layer 4Transport Layer 5Network Layer 6Data Link Layer 7Physical Layer IP TCP, UDP Ports IP­Address MAC­Address packet level allows mapping to applications 192.168.23.42 80 (http)

(8)

Data Set ­ Attributes

● Time

● Source IP address & port

● Destination IP address & port ● Payload

(9)

Related Work

Stephen Lau “The Spinning Cube  of Potential Doom” Communications of  th ACM, 2004

(10)

Related Work

Anita Komledi et al. “A User­Centric Look at  Glyph­Based Security  Visualization” IEEE Workshop on  Visualization for  Computer Security,  2005

(11)

Related Work

Stefano Foresti et al. “Visual Correlation of  Network Alerts.” IEEE Computer  Graphics and  Applications, 2006

(12)

Related Work

How does this approach differ from these works? ● Bring together the complementing pieces of  information ● Easier reading and interpretation ● Easier­to­understand metaphors

(13)

Radial Traffic Analyzer

● Attributes are mapped to  different rings ● User selects important  attributes to be displayed  in the inner rings ● From inside to outside the  attributes are used  successively for grouping  and sorting Layout

(14)

Radial Traffic Analyzer

Why a radial layout?

● Supports better the task of finding suspicious patterns ● User is not misguided to place more importance on an 

(15)

Coloring Concept ● Special colors ● Brightness for  secure / unsecured Uses distinct colors  for IP adresses and  ports

(16)

Radial Traffic Analyzer

Interactivity ● Positioning and thus importance within the sorting  order can be changed using drag & drop operations ● Tooltips are used to display the full label in case of  small segments and additional information (host name,  possible application programs)

(17)

Radial Traffic Analyzer

Interactivity ● Detailed information for a segment is accessible using  a popup menu ● Different measures: transferred bytes, number of  connections, number of sessions ● Mouse click filters / discards all traffic with the chosen  attribute

(18)

Radial Traffic Analyzer

(19)

Combining RTA with Geospatial Displays

Idea for HistoMap ● Retrieve country names for IP addresses using  Maxmind's GeoIP Database ● Use squarified treemap layout ● Size of rectangles corresponds to traffic volume

(20)
(21)

Interactive Exploration of Data Traffic with 

Hierarchical Network Maps

Florian Mansmann     Svetlana Vinnik

(22)

● Display the distribution of source and target data traffic 

of network nodes

● Visualization of port activity

● Also a space­filling technique       TreeMap

(23)
(24)

Layout ● Squarified treemap ● To get an almost static map layout, the total size of the  network and its components is used (user orientation) ● Nodes on continent and country level preserve their  relative geographical position ● Nodes on the other levels are sorted by IP addresses

Hierarchical Network Maps

(25)
(26)
(27)

Hierarchical Network Maps

Filters ● Type of load (packets sent, received or total) ● Time frame ● Port or port cluster ● Protocol

(28)

Hierarchical Network Maps

Large amounts of data ● It turned out to be infeasible to process the entire  network data ● Aggregation entries were used (# sessions, # packets  transferred, bytes transferred) ● Usage of data warehouse techniques (OLAP cubes) ● Split the log into a ShortTermLog, MiddleTermLog and 

(29)
(30)

Hierarchical Network Maps

Interaction ● User can choose which region of the network should  be investigated further ● Drill­down / roll­up ● Additional information via popup menu (interactive  time, host, and port activity diagrams)

(31)
(32)

Hierarchical Network Maps

Pros ● Integration of geographical information with a clever  layout ● Nice data overview Cons ● Needs a lot of display space depending on the  granularity level

(33)
(34)

Radial Traffic Analyzer

(35)

Radial Traffic Analyzer

(36)

Radial Traffic Analyzer

(37)

Radial Traffic Analyzer

(38)

Radial Traffic Analyzer

(39)

Radial Traffic Analyzer

Pros ● Easy metaphor (e.g. fast perception of the traffic  composition) ● Good color scheme ● Combination of machine techniques and human  capabilities

(40)

Radial Traffic Analyzer

Cons ● Display space / use of tooltips (especially when  displaying both visualizations at once) ● No explanation of the data preprocessing and  performance

(41)

References

Related documents

Data Link Network Access IP Network Access Network Access IP Network Access Data Link Data Link IP protocol Router Router Host Host IP Overview. n IP is the highest layer protocol

Link-Layer (MAC+PHY) Network layer Transport layer Application Link-Layer (MAC+PHY) IP TCP / UDP IP wireless channel End-to-End Optimization RTCP over TCP TCP or UDP RTP over

host host router router Application Layer Transport Layer Network Layer Link Layer.. Encapsulation" HTTP TCP IP Ethernet interface HTTP TCP IP Ethernet interface

Infrastructure protocols n   BGP n DNS Application Transport Network Link Application protocol TCP protocol IP protocol Data Link IP Network Access IP protocol Data

TCP/IP Network Model Process Transport Network Data Link Process Transport Network Data Link Interface Protocols Peer-to-peer Protocols.. Terms

The network access layer covers OSI physical and data link layers; the TCP/IP application layer covers OSI presentation and application layers; there is no session layer in the

An example with TCP Web Browser Web Browser UDP UDP TCP TCP IP (network layer) IP (network layer) Data Link (modem, PPP) Data Link (modem, PPP) Physical (twisted pair)

5.2 TCP/IP Model: Layered Architecture, Data Link Layer: Nodes and links, services, two categories of sub layers, Link layer addressing: three types of addresses, address