An Eye on Network Intruder-Administrator Shootouts
In 1st Workshop on Intrusion Detection and Network Monitoring (ID ’99), The USENIX Association, 19–28.
Carefully logging network activity is essential to meet the requirements of high security and optimal resource availability. However, detecting break‐in attempts within this activity is a difficult task. Making the distinction between misuse and normal use is hard, and identifying intrusions that use novel attacks is fundamentally difficult. In this paper, we introduce a visual approach for analyzing network activity. This approach differs from anomaly and misuse detection because it considers human factors to support the exploration of network traffic. Our prototype application is based on an unsupervised neural network and consequently does not rely on any prior knowledge of the data being analyzed. We use self‐organizing maps to project the network events on a space appropriate for visualization, and achieve their exploration using a map metaphor. The approach we present can be used to analyze past and present activities, as well as to show trends in the events. To demonstrate the usability of our tools, we describe the investigation of a dataset containing common intrusion patterns. We also discuss some weaknesses of current intrusion detection systems and propose a new paradigm for monitoring network activity that enables the discovery of new, sophisticated, and structured attacks.
Girardin, Luc. 1999. “An Eye on Network Intruder-Administrator Shootouts.” In 1st Workshop on Intrusion Detection and Network Monitoring (ID ’99), The USENIX Association, 19–28.
@inproceedings{an-eye-on-network-intruder-administrator-shootouts,
author = {Luc Girardin},
title = {An Eye on Network Intruder-Administrator Shootouts},
booktitle = {1st Workshop on Intrusion Detection and Network Monitoring (ID '99)},
year = {1999},
pages = {19--28},
publisher = {The USENIX Association},
location = {},
abstract = {Carefully logging network activity is essential to meet the requirements of high security and optimal resource availability. However, detecting break-in attempts within this activity is a difficult task. Making the distinction between misuse and normal use is hard, and identifying intrusions that use novel attacks is fundamentally difficult. In this paper, we introduce a visual approach for analyzing network activity. This approach differs from anomaly and misuse detection because it considers human factors to support the exploration of network traffic. Our prototype application is based on an unsupervised neural network and consequently does not rely on any prior knowledge of the data being analyzed. We use self-organizing maps to project the network events on a space appropriate for visualization, and achieve their exploration using a map metaphor. The approach we present can be used to analyze past and present activities, as well as to show trends in the events. To demonstrate the usability of our tools, we describe the investigation of a dataset containing common intrusion patterns. We also discuss some weaknesses of current intrusion detection systems and propose a new paradigm for monitoring network activity that enables the discovery of new, sophisticated, and structured attacks.},
url = {https://www.usenix.org/conference/id-99/eye-network-intruder-administrator-shootouts},
pdf = {http://www.ubilab.org/publications/print_versions/pdf/gir99-1.pdf},
status = {personal}
}