Visible to the public "SNAPS: Semantic network traffic analysis through projection and selection"Conflict Detection Enabled

Title"SNAPS: Semantic network traffic analysis through projection and selection"
Publication TypeConference Paper
Year of Publication2015
AuthorsB. C. M. Cappers, J. J. van Wijk
Conference Name2015 IEEE Symposium on Visualization for Cyber Security (VizSec)
Date PublishedOct
PublisherIEEE
ISBN Number978-1-4673-7599-3
Accession Number15573026
Keywordsadvanced persistent threat, advanced persistent threats, anomaly detection, bottom-up pixel-oriented approach, Context, Data visualization, high-level flow-based message properties, Histograms, Image color analysis, interaction, Iterative methods, learning (artificial intelligence), low-level anomalies, machine learning, malicious activity, multivariate analysis, network level security risk, network traffic analysis, online monitoring tasks, packet inspection, parse data analysis, Payloads, post-traffic analysis, Protocols, pubcrawl170101, security breaches, semantic network traffic analysis through projection and selection, semantic networks, Semantics, SNAPS, streaming data, telecommunication computing, telecommunication security, telecommunication traffic
Abstract

Most network traffic analysis applications are designed to discover malicious activity by only relying on high-level flow-based message properties. However, to detect security breaches that are specifically designed to target one network (e.g., Advanced Persistent Threats), deep packet inspection and anomaly detection are indispensible. In this paper, we focus on how we can support experts in discovering whether anomalies at message level imply a security risk at network level. In SNAPS (Semantic Network traffic Analysis through Projection and Selection), we provide a bottom-up pixel-oriented approach for network traffic analysis where the expert starts with low-level anomalies and iteratively gains insight in higher level events through the creation of multiple selections of interest in parallel. The tight integration between visualization and machine learning enables the expert to iteratively refine anomaly scores, making the approach suitable for both post-traffic analysis and online monitoring tasks. To illustrate the effectiveness of this approach, we present example explorations on two real-world data sets for the detection and understanding of potential Advanced Persistent Threats in progress.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7312768&isnumber=7312757
DOI10.1109/VIZSEC.2015.7312768
Citation Key7312768