search query: @supervisor Jiang, Yuming / total: 2
reference: 2 / 2
« previous | next »
Author:Jin, Zhihua
Title:Visualization of Network Traffic to Detect Malicious Network activity
Publication type:Master's thesis
Publication year:2008
Pages:102      Language:   eng
Department/School:Informaatio- ja luonnontieteiden tiedekunta
Main subject:Tietokoneverkot   (T-110)
Supervisor:Ylä-Jääski, Antti ; Jiang, Yuming
Instructor:Knutsen, Morten ; Oslebo, Arne
OEVS:
Electronic archive copy is available via Aalto Thesis Database.
Instructions

Reading digital theses in the closed network of the Aalto University Harald Herlin Learning Centre

In the closed network of Learning Centre you can read digital and digitized theses not available in the open network.

The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/

You can read theses on the Learning Centre customer computers, which are available on all floors.

Logging on to the customer computers

  • Aalto University staff members log on to the customer computer using the Aalto username and password.
  • Other customers log on using a shared username and password.

Opening a thesis

  • On the desktop of the customer computers, you will find an icon titled:

    Aalto Thesis Database

  • Click on the icon to search for and open the thesis you are looking for from Aaltodoc database. You can find the thesis file by clicking the link on the OEV or OEVS field.

Reading the thesis

  • You can either print the thesis or read it on the customer computer screen.
  • You cannot save the thesis file on a flash drive or email it.
  • You cannot copy text or images from the file.
  • You cannot edit the file.

Printing the thesis

  • You can print the thesis for your personal study or research use.
  • Aalto University students and staff members may print black-and-white prints on the PrintingPoint devices when using the computer with personal Aalto username and password. Color printing is possible using the printer u90203-psc3, which is located near the customer service. Color printing is subject to a charge to Aalto University students and staff members.
  • Other customers can use the printer u90203-psc3. All printing is subject to a charge to non-University members.
Location:P1 Ark Aalto     | Archive
Keywords:security visualization
netflow
malicious activity detection
Abstract (eng): Today enormous logging data monitoring the traffics of the Internet is generated everyday.
However, the network administrators still have very limited insight into the logging data, mainly due to the lack of efficient analyzing approaches.
Most of the existing network monitoring or analysis tools either mainly focus on the throughput of the network in order to assist network structure planning and optimization, which is too high level for security analysis, or dig to too low level into every packet, which is too inefficient in practice.

Unfortunately, not all network traffics are legitimate.
As a matter of fact, a lot of malicious traffics flow through the Internet all the time.
Such malicious traffics can lead to various cyber-crimes, and exhaust considerable network bandwidth.
The expression that what you do not see can hurt you perfectly suits the situation here.

In order to help the network administrators to discover malicious activities in their network traffics, this thesis attempt to explore suitable visualization techniques to distinguish malicious traffics from massive background traffics by using visual patterns, to which the human visual perception system is sensitive and can thus processes efficiently.

To achieve such goal, we first extract the visual patterns of malicious activities from known malicious traffics.
Then, we look for the same visual patterns in the normal traffics When the same visual pattern is found, we identify the relevant malicious activities.

The tool used in our experimentation is designed and implemented according to the experiences learned from previous related works, with special regards to human visual perception theory.
The result of our experimentation shows that some malicious activities which can not be easily identified in traditional analyzing approaches before, can be identified by our visualization system under certain conditions.
ED:2008-10-03
INSSI record number: 36373
+ add basket
« previous | next »
INSSI