SlideShare a Scribd company logo
1 of 18
Download to read offline
Network Security
Visualization
Research
Kulsoom Abdullah PhD
1
Kulsoom Abdullah's LinkedIn profile
https://www.linkedin.com/in/kulsoomabdullah
•  PhD Thesis work
•  Post-PhD work
Outline
2
•  Network traffic capacity is greater than
systems can process
•  Network attacks have not decreased,
current security tools are insufficient 
•  Information visualization techniques used
in network security research have initial
success and future promise 
•  Text logs and machine learning
algorithms are complemented and
information is represented more densely.
Why Information
Visualization & Network
Security
3
•  Graph occlusion
•  Avoid overlap and occlusion in the
visualizations
•  Scaling data parameters ranges
•  For networking, port numbers & IP addresses
need scaling
•  65535 TCP and UDP ports
•  4 billion possible IP addresses
•  Time scaling
•  Needs to be either small or large depending
on activity
•  small for quick activities: fast network scans,
DoS, fast propagating worms
•  large for slow network scans, overall trends
in a network 
Network data & graph
scaling issues
4
IDS Rainstorm
Main View

•  This design scales all of
the GT IP addresses
•  2.5 Class B addresses
plotted along 8 vertical
axis
•  20 IPs represented on
each line
•  Color represents
severity
•  Time: 24 hours of
Stealthwatch IDS alarms
shown
•  Most logs are archived
into 24 hours
•  Filtering on alarm type &
priority
 5
Zoom View
6
Examples
7
8!
ICMP Flood Example!
9
Worm
Watch port active alarms in
dorm space. Port watch was
on a known exploit.
•  All stated that time was saved compared to
using traditional IDS logs, it was simple and
intuitive to use & functioned well
•  Seeing patterns and sequence & connections
between host
•  Some did not return to the alarm text log &
some did return to the log for more detail
•  Not all alarm parameters are visually encoded 
•  Avoid overlap and occlusion in the
visualizations
•  Time scaling - Needs to be either small or large
depending on activity
•  small for quick activities: fast network scans,
DoS, fast propagating worms
•  large for slow network scans, overall trends in
a network 
Results-User Study
10
•  K. Abdullah, G. Conti and R. Beyah. “A Visualization Framework for Self-monitoring of
Web-based Information Disclosure” IEEE International Conference on Communications
(ICC), May 2008. (Post PhD) http://bit.ly/1WfUbu1
•  K. Abdullah, G. Conti and E. Sobiesk. “Self-monitoring of Web-based Information Disclosure”
Workshop on Privacy in the Electronic Society (WPES); October 2007. http://bit.ly/1WfUB3L
Cited in: G. Conti; Googling Security [http://amzn.to/1NcestF], Addison Wesley; November 2008.
(Post PhD) 
•  K. Abdullah, J. A. Copeland. ”High alarm count issues in IDS RainStorm” ACM Conference on
Computer and Communications Security’s Workshop on Visualization and Data Mining for
Computer Security (VizSEC); November 2006. http://bit.ly/1KioKbz
•  K. Abdullah, C. Lee, G. Conti and J. Copeland. “Processing Data to Construct Practical
Visualizations for Network Security” Information Assurance Newsletter, Information
Assurance Technology Analysis Center, United States Department of Defense, Summer 2006.
http://bit.ly/1Snimrt
•  G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J. Copeland, M. Ahamad, H. Owen and C. Lee,
”Countering Security Analyst and Network Administrator Overload Through Alert and
Packet Visualization” IEEE Computer Graphics and Applications (CG&A), March 2006. http://
bit.ly/1ZqpgeD
•  K. Abdullah, C. Lee, G. Conti, J. Copeland and J. Stasko, “IDS RainStorm: Visualizing IDS
Alarms” IEEE Symposium on Information Visualization’s Workshop on Visualization for
Computer Security (VizSEC); October 2005. http://bit.ly/1n1Heb8 Cited in: G. Conti; Security
Data Visualization, No Starch Press; September 2007 http://amzn.to/1UVZPjY
•  K. Abdullah, C. Lee, G. Conti and J. Copeland, “Visualizing Network Data for Intrusion
Detection” IEEE Information Assurance Workshop (IAW); June 2005. http://bit.ly/1lg5m8P
•  G. Conti and K. Abdullah,“Passive Visual Fingerprinting of Network Attack Tools” ACM
Conference on Computer and Communications Security’s Workshop on Visualization and Data
Mining for Computer Security (VizSEC); October 2004. http://bit.ly/1PwRaR1
Publications
11
Post PHD
Network
Visualization
Research
3D Network Security Visualization 
12
3D Network
Security
Visualization
Troy Nunnally, CAP &
CSC at GATECH
•  3D Shows more
information vs 2D
•  3D can be difficult to
for Novices to
navigate
13
T. Nunnally, P. Chi, K. Abdullah, A. S. Uluagac, and R. A. Beyah, “P3D: A Parallel 3D Coordinate System for Advanced Network Scans”,
IEEE International Conference on Communications (ICC), Budapest, Hungary, September 2013
14!
Collaborative Filtering &
Global Restriction
15!
16!
T. Nunnally, K. Abdullah, A. S. Uluagac, and R. A. Beyah, “NAVSEC : A Recommender System
for 3D Network Security Visualizations”, IEEE Symposium on Information Visualization’s
Workshop on Visualization for Computer Security (VizSEC), Atlanta, GA, USA, October 2013.!
Stealthy Port
Scanning Use-Case
P3D Multiple concurrent FTP scan
 P3D Multiple concurrent FTP scan
17
•  Implementation and evaluation of more
advance use-case scenarios (i.e.,
introduce benign traffic) 
•  T. Nunnally, K. Abdullah, A. S. Uluagac, J. A. Copeland & R. A. Beyah,
"InterSec: An Interaction System for Network Security Applications",
IEEE Symposium on Information Visualization's Workshop on Visualization for
Computer Security (VizSEC) 2014. http://bit.ly/1P58Hpd
•  User Testing
•  3D, Stereoscopic view, Navigation
Assistance
•  Natural User Interface
•  Kinect, WII
Future P3D work
18

More Related Content

What's hot

NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
North Texas Chapter of the ISSA
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
Ulf Mattsson
 

What's hot (20)

ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
Jisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in SecurityJisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in Security
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 
Guardians of the future what should we do to secure future cyberspace
Guardians of the future  what should we do to secure future cyberspace Guardians of the future  what should we do to secure future cyberspace
Guardians of the future what should we do to secure future cyberspace
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain Group
 
IoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesIoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approaches
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 

Viewers also liked

Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
Claude Baudoin
 

Viewers also liked (9)

Network Security Visualization
Network Security VisualizationNetwork Security Visualization
Network Security Visualization
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 

Similar to PhD and Post PhD Network Security Visualization Research

IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Brian Knopf
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Paul Fechtelkotter
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
Gordon Haff
 

Similar to PhD and Post PhD Network Security Visualization Research (20)

CFP-INMIC2022.pdf
CFP-INMIC2022.pdfCFP-INMIC2022.pdf
CFP-INMIC2022.pdf
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Science DMZ as a Service: Creating Science Super- Facilities with GENI
Science DMZ as a Service: Creating Science Super- Facilities with GENIScience DMZ as a Service: Creating Science Super- Facilities with GENI
Science DMZ as a Service: Creating Science Super- Facilities with GENI
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
Cloud and Grid Computing
Cloud and Grid ComputingCloud and Grid Computing
Cloud and Grid Computing
 
Cloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, Centric
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of Things
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
Fog computing
Fog computingFog computing
Fog computing
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
Bluetooth low energy- Kashyap Velpuru
Bluetooth low energy- Kashyap VelpuruBluetooth low energy- Kashyap Velpuru
Bluetooth low energy- Kashyap Velpuru
 

Recently uploaded

CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
gajnagarg
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
gajnagarg
 
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men 🔝Ongole🔝 Escorts S...
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men  🔝Ongole🔝   Escorts S...➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men  🔝Ongole🔝   Escorts S...
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men 🔝Ongole🔝 Escorts S...
amitlee9823
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
gajnagarg
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 

Recently uploaded (20)

CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls kakinada Escorts ☎️9352988975 Two shot with one girl...
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
 
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men 🔝Ongole🔝 Escorts S...
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men  🔝Ongole🔝   Escorts S...➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men  🔝Ongole🔝   Escorts S...
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men 🔝Ongole🔝 Escorts S...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls Mysore Escorts ☎️9352988975 Two shot with one girl (...
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 

PhD and Post PhD Network Security Visualization Research

  • 1. Network Security Visualization Research Kulsoom Abdullah PhD 1 Kulsoom Abdullah's LinkedIn profile https://www.linkedin.com/in/kulsoomabdullah
  • 2. •  PhD Thesis work •  Post-PhD work Outline 2
  • 3. •  Network traffic capacity is greater than systems can process •  Network attacks have not decreased, current security tools are insufficient •  Information visualization techniques used in network security research have initial success and future promise •  Text logs and machine learning algorithms are complemented and information is represented more densely. Why Information Visualization & Network Security 3
  • 4. •  Graph occlusion •  Avoid overlap and occlusion in the visualizations •  Scaling data parameters ranges •  For networking, port numbers & IP addresses need scaling •  65535 TCP and UDP ports •  4 billion possible IP addresses •  Time scaling •  Needs to be either small or large depending on activity •  small for quick activities: fast network scans, DoS, fast propagating worms •  large for slow network scans, overall trends in a network Network data & graph scaling issues 4
  • 5. IDS Rainstorm Main View •  This design scales all of the GT IP addresses •  2.5 Class B addresses plotted along 8 vertical axis •  20 IPs represented on each line •  Color represents severity •  Time: 24 hours of Stealthwatch IDS alarms shown •  Most logs are archived into 24 hours •  Filtering on alarm type & priority 5
  • 9. 9 Worm Watch port active alarms in dorm space. Port watch was on a known exploit.
  • 10. •  All stated that time was saved compared to using traditional IDS logs, it was simple and intuitive to use & functioned well •  Seeing patterns and sequence & connections between host •  Some did not return to the alarm text log & some did return to the log for more detail •  Not all alarm parameters are visually encoded •  Avoid overlap and occlusion in the visualizations •  Time scaling - Needs to be either small or large depending on activity •  small for quick activities: fast network scans, DoS, fast propagating worms •  large for slow network scans, overall trends in a network Results-User Study 10
  • 11. •  K. Abdullah, G. Conti and R. Beyah. “A Visualization Framework for Self-monitoring of Web-based Information Disclosure” IEEE International Conference on Communications (ICC), May 2008. (Post PhD) http://bit.ly/1WfUbu1 •  K. Abdullah, G. Conti and E. Sobiesk. “Self-monitoring of Web-based Information Disclosure” Workshop on Privacy in the Electronic Society (WPES); October 2007. http://bit.ly/1WfUB3L Cited in: G. Conti; Googling Security [http://amzn.to/1NcestF], Addison Wesley; November 2008. (Post PhD) •  K. Abdullah, J. A. Copeland. ”High alarm count issues in IDS RainStorm” ACM Conference on Computer and Communications Security’s Workshop on Visualization and Data Mining for Computer Security (VizSEC); November 2006. http://bit.ly/1KioKbz •  K. Abdullah, C. Lee, G. Conti and J. Copeland. “Processing Data to Construct Practical Visualizations for Network Security” Information Assurance Newsletter, Information Assurance Technology Analysis Center, United States Department of Defense, Summer 2006. http://bit.ly/1Snimrt •  G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J. Copeland, M. Ahamad, H. Owen and C. Lee, ”Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization” IEEE Computer Graphics and Applications (CG&A), March 2006. http:// bit.ly/1ZqpgeD •  K. Abdullah, C. Lee, G. Conti, J. Copeland and J. Stasko, “IDS RainStorm: Visualizing IDS Alarms” IEEE Symposium on Information Visualization’s Workshop on Visualization for Computer Security (VizSEC); October 2005. http://bit.ly/1n1Heb8 Cited in: G. Conti; Security Data Visualization, No Starch Press; September 2007 http://amzn.to/1UVZPjY •  K. Abdullah, C. Lee, G. Conti and J. Copeland, “Visualizing Network Data for Intrusion Detection” IEEE Information Assurance Workshop (IAW); June 2005. http://bit.ly/1lg5m8P •  G. Conti and K. Abdullah,“Passive Visual Fingerprinting of Network Attack Tools” ACM Conference on Computer and Communications Security’s Workshop on Visualization and Data Mining for Computer Security (VizSEC); October 2004. http://bit.ly/1PwRaR1 Publications 11
  • 13. 3D Network Security Visualization Troy Nunnally, CAP & CSC at GATECH •  3D Shows more information vs 2D •  3D can be difficult to for Novices to navigate 13
  • 14. T. Nunnally, P. Chi, K. Abdullah, A. S. Uluagac, and R. A. Beyah, “P3D: A Parallel 3D Coordinate System for Advanced Network Scans”, IEEE International Conference on Communications (ICC), Budapest, Hungary, September 2013 14!
  • 16. 16! T. Nunnally, K. Abdullah, A. S. Uluagac, and R. A. Beyah, “NAVSEC : A Recommender System for 3D Network Security Visualizations”, IEEE Symposium on Information Visualization’s Workshop on Visualization for Computer Security (VizSEC), Atlanta, GA, USA, October 2013.!
  • 17. Stealthy Port Scanning Use-Case P3D Multiple concurrent FTP scan P3D Multiple concurrent FTP scan 17
  • 18. •  Implementation and evaluation of more advance use-case scenarios (i.e., introduce benign traffic) •  T. Nunnally, K. Abdullah, A. S. Uluagac, J. A. Copeland & R. A. Beyah, "InterSec: An Interaction System for Network Security Applications", IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC) 2014. http://bit.ly/1P58Hpd •  User Testing •  3D, Stereoscopic view, Navigation Assistance •  Natural User Interface •  Kinect, WII Future P3D work 18