2009 Cybersecurity Applications &Amp; Technology Conference for Homeland Security 2009
DOI: 10.1109/catch.2009.18
|View full text |Cite
|
Sign up to set email alerts
|

FloVis: Flow Visualization System

Abstract: NetFlow data is routinely captured at the border of many enterprise networks. Although not as rich as full packetcapture data, NetFlow provides a compact record of the interactions between host pairs on either side of the monitored border. Analysis of this data presents a challenge to the security analyst due to its volume. We report preliminary results on the development of a suite of visualization tools that are intended to complement command line tools, such as those from the SiLK Tools, that are currently … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
22
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(23 citation statements)
references
References 23 publications
0
22
0
Order By: Relevance
“…The existing literature on security visualization also does not explicitly state that the focus is IPv4 traffic, but typically implicitly assumes that IPv4 is the underlying protocol of the analyzed network traffic. Several visualization tools [10,11,17] which provide good insight into remote IP behavior are limited to IPv4 addresses.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The existing literature on security visualization also does not explicitly state that the focus is IPv4 traffic, but typically implicitly assumes that IPv4 is the underlying protocol of the analyzed network traffic. Several visualization tools [10,11,17] which provide good insight into remote IP behavior are limited to IPv4 addresses.…”
Section: Related Workmentioning
confidence: 99%
“…If a dual stack capture 3 is loaded, the tool will just ignore the IPv6 packets and not display them. NVisionIP [11] and Flovis [17] are other examples of tools where only 32-bit source addresses are currently supported. Koike et al [10] also describe a technique similar to NVisionIP in which source and destination addresses are visualized in a 2D matrix; only IPv4 addresses can be displayed.…”
mentioning
confidence: 99%
“…In [12], the authors present the client-based visualization tool FlowVis, which uses the SiLK tools for processing NetFlow data. They provide proofof-concept visualizations like activity plots, flow edge bundles, and network bytes viewer.…”
Section: Related Workmentioning
confidence: 99%
“…The existing literature on security visualization also does not explicitly state that the focus is IPv4 traffic, but typically implicitly assumes that IPv4 is the underlying protocol of the analyzed network traffic. Several visualization tools [11,12,19] which provide good insight into remote IP behavior are limited to IPv4 addresses. Nakamae et al [18] (CAIDA) has also produced visualizations displaying IPv6 autonomous system (AS) interconnections [5].…”
Section: Related Workmentioning
confidence: 99%
“…If a dual stack capture (i.e., containing both IPv4 and IPv6 data) is loaded, the tool will just ignore the IPv6 packets and not display them. NVisionIP [12] and Flovis [19] are other examples of tools where only 32-bit source addresses are currently supported. Koike et al [11] also describe a technique similar to NVisionIP in which source and destination addresses are visualized in a 2D matrix; only IPv4 addresses can be displayed.…”
mentioning
confidence: 99%