"SNAPS: Semantic network traffic analysis through projection and selection"
Title | "SNAPS: Semantic network traffic analysis through projection and selection" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | B. C. M. Cappers, J. J. van Wijk |
Conference Name | 2015 IEEE Symposium on Visualization for Cyber Security (VizSec) |
Date Published | Oct |
Publisher | IEEE |
ISBN Number | 978-1-4673-7599-3 |
Accession Number | 15573026 |
Keywords | advanced persistent threat, advanced persistent threats, anomaly detection, bottom-up pixel-oriented approach, Context, Data visualization, high-level flow-based message properties, Histograms, Image color analysis, interaction, Iterative methods, learning (artificial intelligence), low-level anomalies, machine learning, malicious activity, multivariate analysis, network level security risk, network traffic analysis, online monitoring tasks, packet inspection, parse data analysis, Payloads, post-traffic analysis, Protocols, pubcrawl170101, security breaches, semantic network traffic analysis through projection and selection, semantic networks, Semantics, SNAPS, streaming data, telecommunication computing, telecommunication security, telecommunication traffic |
Abstract | Most network traffic analysis applications are designed to discover malicious activity by only relying on high-level flow-based message properties. However, to detect security breaches that are specifically designed to target one network (e.g., Advanced Persistent Threats), deep packet inspection and anomaly detection are indispensible. In this paper, we focus on how we can support experts in discovering whether anomalies at message level imply a security risk at network level. In SNAPS (Semantic Network traffic Analysis through Projection and Selection), we provide a bottom-up pixel-oriented approach for network traffic analysis where the expert starts with low-level anomalies and iteratively gains insight in higher level events through the creation of multiple selections of interest in parallel. The tight integration between visualization and machine learning enables the expert to iteratively refine anomaly scores, making the approach suitable for both post-traffic analysis and online monitoring tasks. To illustrate the effectiveness of this approach, we present example explorations on two real-world data sets for the detection and understanding of potential Advanced Persistent Threats in progress. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7312768&isnumber=7312757 |
DOI | 10.1109/VIZSEC.2015.7312768 |
Citation Key | 7312768 |
- semantic network traffic analysis through projection and selection
- online monitoring tasks
- packet inspection
- parse data analysis
- Payloads
- post-traffic analysis
- Protocols
- pubcrawl170101
- security breaches
- network traffic analysis
- Semantic Networks
- Semantics
- SNAPS
- streaming data
- telecommunication computing
- telecommunication security
- telecommunication traffic
- Interaction
- advanced persistent threats
- Anomaly Detection
- bottom-up pixel-oriented approach
- Context
- Data visualization
- high-level flow-based message properties
- Histograms
- Image color analysis
- advanced persistent threat
- Iterative methods
- learning (artificial intelligence)
- low-level anomalies
- machine learning
- malicious activity
- multivariate analysis
- network level security risk