skip to main content
10.1145/1142405.1142465acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
Article

Visualizing network traffic for intrusion detection

Published: 26 June 2006 Publication History

Abstract

Intrusion detection, the process of using network data to identify potential attacks, has become an essential component of information security. Human analysts doing intrusion detection work utilize vast amounts of data from disparate sources to make decisions about potential attacks. Yet, there is limited understanding of this critical human component. This research seeks to understand the work practices of these human analysts to inform the design of a task-appropriate information visualization tool to support network intrusion detection analysis tasks. System design will follow a user-centered, spiral methodology. System evaluation will include both a field-based qualitative evaluation, uncommon in information visualization, and a lab-based benchmarking evaluation.

References

[1]
Card, S.K., Mackinlay, J.D. and Shneiderman, B. Information visualization: Using vision to think. Morgan Kaufman Publishers, San Francisco, CA, 1999.
[2]
Goodall, J.R., Lutters, W.G. and Komlodi, A., The work of intrusion detection: Rethinking the role of security analysts. Proc. of AMCIS, (2004), 1421--1427.
[3]
Goodall, J.R., Ozok, A.A., Lutters, W.G., Rheingans, P. and Komlodi, A., A user-centered approach to visualizing network traffic for intrusion detection. Ext. Abstracts ACM CHI, (2005), 1403--1406.
[4]
Julisch, K. and Dacier, M., Mining intrusion detection alarms for actionable knowledge. Proc. of ACM SIGKDD, (2002), 366--375.
[5]
Stolze, M., Pawlitzek, R. and Wespi, A., Visual problem-solving support for new event triage in centralized network security monitoring: Challenges, tools and benefits. GI-SIDAR Conf. IMF (2003).
[6]
Yurcik, W., Barlow, J., Lakkaraju, K. and Haberman, M., Two visual computer network security monitoring tools incorporating operator interface requirements. ACM CHI HCISEC Workshop, (2003).

Cited By

View all
  • (2022)A study on Automated Cyberattacks Detection and Visualization2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)10.1109/CICN56167.2022.10008351(715-722)Online publication date: 4-Dec-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DIS '06: Proceedings of the 6th conference on Designing Interactive systems
June 2006
384 pages
ISBN:1595933670
DOI:10.1145/1142405

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. HCI
  2. information visualization
  3. intrusion detection
  4. network security

Qualifiers

  • Article

Conference

DIS06
Sponsor:
DIS06: Designing Interactive Systems 2006
June 26 - 28, 2006
PA, University Park, USA

Acceptance Rates

Overall Acceptance Rate 1,158 of 4,684 submissions, 25%

Upcoming Conference

DIS '25
Designing Interactive Systems Conference
July 5 - 9, 2025
Funchal , Portugal

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)A study on Automated Cyberattacks Detection and Visualization2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)10.1109/CICN56167.2022.10008351(715-722)Online publication date: 4-Dec-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media