search query: @instructor Halonen, Perttu / total: 2
reference: 2 / 2
« previous | next »
Author:Zahariev, Alexander
Title:Graphical user interface for intrusion detection in telecommunications networks
Publication type:Master's thesis
Publication year:2011
Pages:[7] + 66 s. + liitt. 3      Language:   eng
Department/School:Tietotekniikan laitos
Main subject:Tietokoneverkot   (T-110)
Supervisor:Aura, Tuomas
Instructor:Hätönen, Kimmo ; Halonen, Perttu
OEVS:
Electronic archive copy is available via Aalto Thesis Database.
Instructions

Reading digital theses in the closed network of the Aalto University Harald Herlin Learning Centre

In the closed network of Learning Centre you can read digital and digitized theses not available in the open network.

The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/

You can read theses on the Learning Centre customer computers, which are available on all floors.

Logging on to the customer computers

  • Aalto University staff members log on to the customer computer using the Aalto username and password.
  • Other customers log on using a shared username and password.

Opening a thesis

  • On the desktop of the customer computers, you will find an icon titled:

    Aalto Thesis Database

  • Click on the icon to search for and open the thesis you are looking for from Aaltodoc database. You can find the thesis file by clicking the link on the OEV or OEVS field.

Reading the thesis

  • You can either print the thesis or read it on the customer computer screen.
  • You cannot save the thesis file on a flash drive or email it.
  • You cannot copy text or images from the file.
  • You cannot edit the file.

Printing the thesis

  • You can print the thesis for your personal study or research use.
  • Aalto University students and staff members may print black-and-white prints on the PrintingPoint devices when using the computer with personal Aalto username and password. Color printing is possible using the printer u90203-psc3, which is located near the customer service. Color printing is subject to a charge to Aalto University students and staff members.
  • Other customers can use the printer u90203-psc3. All printing is subject to a charge to non-University members.
Location:P1 Ark Aalto  6918   | Archive
Keywords:network security monitoring
network-based intrusion detection
visualization for network security
large-scale network analysis
Abstract (eng): Telecommunications networks increasingly depend on the Internet and computer networks.
This exposes the telecommunications systems to intrusions, data theft, and service interruptions.
Protecting against the intrusions is especially challenging because of the complex interdependencies inside the networks and between different networks.
Moreover, a trend towards massive attacks against the network infrastructure is already evident.

One solution to the security concerns is monitoring.
Monitoring of large networks has become an active field both in practice and research.
Through monitoring systems, malicious activities can be identified and analyzed, and knowledge is gained for better protecting the networks in the future.
The work of network administrators can be aided by visualizing the monitoring data and results of analysis tools.
The current security analysis and visualization tools have been designed for monitoring enterprise networks and do not adequately support the monitoring of telecommunication networks.
One reason is that, in telecommunication networks, the volume of produced alarms and reports is far bigger than in enterprise networks and this increases the workload of network administrators.
It is also necessary to understand the specific information, data sources and visualization methods suitable for telecommunications systems.

This thesis focuses on solving the above problems in network-based intrusion detection systems (NIDS) that are based on anomaly detection.
It presents a graphical user interface (GUI) concept for the analysis of anomalies in a telecommunications network environment.
The goal of this GUI is to enable efficient exploration of suspicious events within the monitored network.
In this concept, various visualization methods are used in order to enable a quick visual insight into communications patterns.
Two use cases with synthetic data are used to demonstrate how the GUI facilitates the network administrator's work in judging the relevance of alerts and analyzing service usage within a network.
ED:2011-05-17
INSSI record number: 42078
+ add basket
« previous | next »
INSSI