Skip to main content

Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9390))

Abstract

In computer networks many components produce valuable information about themselves or other participants, especially security analysis relevant information. Although such information is intrinsically related as components are connected by a network, most of them still operate independently and do not share data amongst each other. Furthermore, the highly dynamic nature of a network hampers a profound understanding of security relevant situations, such as attack scenarios. Hence, a comprehensive view of the network including multiple information sources as well as temporal network evolution would significantly improve security analysis and evaluation capabilities. In this paper, we introduce a comprehensive approach for an integrated visualization, covering all aspects from data acquisition in various sources up to visual representation of the integrated information. We analyze the requirements on the basis of an exemplary scenario, propose solutions covering these demands based on the IF-MAP protocol, and introduce our software application VisITMeta as a prototypical implementation. We show how the graph-based IF-MAP protocol provides a graphical model for an integrated view of network security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.alienvault.com/open-threat-exchange/projects.

  2. 2.

    http://securedecisions.com/products/viassist/.

  3. 3.

    https://www.prelude-ids.org/.

  4. 4.

    https://github.com/trustathsh/visitmeta.

  5. 5.

    http://jung.sourceforge.net/.

  6. 6.

    https://code.google.com/p/piccolo2d/.

  7. 7.

    https://www.leapmotion.com/.

  8. 8.

    https://github.com/trustathsh/irondemo.

  9. 9.

    http://simu-project.de/.

References

  1. Ahlers, V., Heine, F., Hellmann, B., Kleiner, C., Renners, L., Rossow, T., Steuerwald, R.: Replicable security monitoring: Visualizing time-variant graphs of network metadata. In: CEUR Workshop Proceedings of the Joint Proceedings of the Fourth International Workshop on Euler Diagrams and the First International Workshop on Graph Visualization in Practice co-located with Diagrams, vol. 1244, pp. 32–41 (2014)

    Google Scholar 

  2. Bente, I., Hellmann, B., Vieweg, J., von Helden, J., Dreo, G.: TCADS: trustworthy, context-related anomaly detection for smartphones. In: Barolli, L., Taniar, D., Enokido, T., Rahayu, J.W., Takizawa, M. (eds.) 15th International Conference on Network-Based Information Systems, NBiS, pp. 247–254. IEEE (2012)

    Google Scholar 

  3. Birkholz, H., Sieverdingbeck, I., Sohr, K., Bormann, C.: IO: an interconnected asset ontology in support of risk management processes. In: Proceedings of the Seventh International Conference on Availability, Reliability and Security, ARES 2012, pp. 534–541. IEEE (2012)

    Google Scholar 

  4. Boschetti, A., Salgarelli, L., Muelder, C., Ma, K.-L.: TVi: a visual querying system for network monitoring and anomaly detection. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec 2011, pp. 1–10. ACM (2011)

    Google Scholar 

  5. Debar, H., Curry, D., Feinstein, B.: The intrusion detection message exchange format (IDMEF), RFC 4765 (Experimental), March 2007

    Google Scholar 

  6. Goodall, J., Sowul, M.: VIAssist: visual analytics for cyber defense. In: Proceedings of the IEEE Conference on Technologies for Homeland Security, HST 2009, pp. 143–150. IEEE (2009)

    Google Scholar 

  7. Karg, D., Muñoz, J.D., Gil, D., Ospitia, F., González, S., Casal, J.: OSSIM: open source security information management, general system description, version 0.18, November 2003. http://www.alienvault.com/docs/OSSIM-desc-en.pdf

  8. Liao, Q., Blaich, A., Striegel, A., Thain, D.: ENAVis: enterprise network activities visualization. In: Proceedings of the 22nd Large Installation System Administration Conference, LISA, pp. 59–74. USENIX Association (2008)

    Google Scholar 

  9. Liao, Q., Striegel, A., Chawla, N.: Visualizing graph dynamics and similarity for enterprise network security and management. In: Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec 2010, pp. 34–45. ACM (2010)

    Google Scholar 

  10. Novikova, E., Kotenko, I.: Analytical visualization techniques for security information and event management. In: 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP, pp. 519–525. IEEE Computer Society Press (2013)

    Google Scholar 

  11. Tamassia, R., Palazzi, B., Papamanthou, C.: Graph drawing for security visualization. In: Tollis, I.G., Patrignani, M. (eds.) GD 2008. LNCS, vol. 5417, pp. 2–13. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Trusted Network Connect Working Group. TNC IF-MAP binding for SOAP, version 2.1, Revision 15, May 2012. http://www.trustedcomputinggroup.org/resources/tnc_ifmap_binding_for_soap_specification

  13. Trusted Network Connect Working Group. TNC IF-MAP metadata for network security, version 1.1, Revision 8, May 2012. http://www.trustedcomputinggroup.org/resources/tnc_ifmap_metadata_for_network_security

  14. Yasm, C.: Prelude as a hybrid IDS framework. Technical report, SAMS Institute (2009). http://www.sans.org/reading-room/whitepapers/awareness/prelude-hybrid-ids-framework-33048

Download references

Acknowledgements

The fruitful collaboration with Gabi Dreo Rodosek, Josef von Helden, Frauke Sprengel, and our students is gratefully acknowledged. This work is financially supported by the German Federal Ministry of Education and Research (BMBF) within the projects VisITMeta (grant no. 17PNT032) and SIMU (grant no. 16KIS0045).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Volker Ahlers .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ahlers, V. et al. (2016). Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources. In: Mauw, S., Kordy, B., Jajodia, S. (eds) Graphical Models for Security. GraMSec 2015. Lecture Notes in Computer Science(), vol 9390. Springer, Cham. https://doi.org/10.1007/978-3-319-29968-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29968-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29967-9

  • Online ISBN: 978-3-319-29968-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics