Visual Analysis of Network Traffic for Resource Planning, Interactive

Transcription

Visual Analysis of Network Traffic for Resource Planning, Interactive
Visual Analysis of Network Traffic
for Resource Planning,
Interactive Monitoring, and
Interpretation of Security Threats
by Florian Mansmann, Daniel A. Keim, Stephen C. North,
Brian Rexroad, and Daniel Sheleheda
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
1
by Sorin Stancu-Mara
Why?
• Visualize internet activity
• Visualize large portions of the internet
• Aggregate data according to
– Continent
– Country
– As
– IP Prefix
• Identify emerging threats and network
anomalies
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
2
by Sorin Stancu-Mara
Data
• Collect via different methods
– Border gate router log
– Flow traces
– Router logs
– GeoIP
• Store everything in a commercial OLAP
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
3
by Sorin Stancu-Mara
Data
• 2 Dimensions:
– Address space:
•
•
•
•
7 continents
190 countries
23054 autonomous systems
197427 prefixes
– Time:
•
•
•
•
•
•
•
Millisecond
Seconds
Minutes
Hours
Days
Months
Years
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
4
by Sorin Stancu-Mara
Display
•
•
•
•
•
Use hierarchical tress
Each node = a rectangle
All children -- inside the parent
Parent size ~ no. nodes it contains
Each leaf color = analyzed fact
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
5
by Sorin Stancu-Mara
Features
•
•
•
•
•
Complete space utilization
Rather easy to generate
Stable under strong changes
Easy to understand
Hard to comperhand
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
6
by Sorin Stancu-Mara
HistoMap - limitations
• Must remove less significant nodes
• Doesn’t aggregate properly under zooming
• Displays only node measurements not
interactions
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
7
by Sorin Stancu-Mara
HistoMap results
Geographic HistoMap
layout of the upper two
levels of the IP
hierarchy. Size represents
the number of IP addresses
assigned to each
country. A seventh
continent is placed below
Australia to visualize ASes
without country reference,
anonymous proxies, and
satellite providers.
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
8
by Sorin Stancu-Mara
HistoMap results
HistoMap 1D layout of all
autonomous systems in
Germany. The
measure (number of incoming
connections) of each item is
expressed
through color.
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
9
by Sorin Stancu-Mara
Order Preserving Layout
• Use StripTree Layout
– Star with a row
• Add nodes while the
aspect ratio decreases
• Create a new row and
continue
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
10
by Sorin Stancu-Mara
HistoMap – The Internet
Anonymized
outgoing traffic
connections from
our university
gateway on
November 29th,
2005 showing all
197427 IP
prefixes
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
11
by Sorin Stancu-Mara
HistoMap – Botnet Spread
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
12
by Sorin Stancu-Mara
HistoMap – Botnet Spread
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
13
by Sorin Stancu-Mara
HistoMap – Botnet Spread
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
14
by Sorin Stancu-Mara
Conclusions
•
•
•
•
Easy to render
Easy to understand
Stable under changes
Can highlight hierarchical structure and
leaf measurements
• Doesn’t show node interactions
• Requires OLAP data provider
Visual Analysis of Network Traffic for Resource Planning,
Interactive Monitoring, and Interpretation of Security Threats
March 20, 2009
15
by Sorin Stancu-Mara