2015
DOI: 10.1016/j.diin.2015.01.005
|View full text |Cite
|
Sign up to set email alerts
|

Hviz: HTTP(S) traffic aggregation and visualization for network forensics

Abstract: a b s t r a c t HTTP and HTTPS traffic recorded at the perimeter of an organization is an exhaustive data source for the forensic investigation of security incidents. However, due to the nested nature of today's Web page structures, it is a huge manual effort to tell apart benign traffic caused by regular user browsing from malicious traffic that relates to malware or insider threats. We present Hviz, an interactive visualization approach to represent the event timeline of HTTP and HTTPS activities of a workst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Referring to Hviz [15], we construct a different web request graph according to different users' IP address. In a web request graph, a node which is represented by URL corresponds to an HTTP request and its response.…”
Section: Constructing Web Request Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…Referring to Hviz [15], we construct a different web request graph according to different users' IP address. In a web request graph, a node which is represented by URL corresponds to an HTTP request and its response.…”
Section: Constructing Web Request Graphmentioning
confidence: 99%
“…(1) We have proposed an approach to detect HTTPbased APT malware infection based on graph reasoning and used Hviz [15] to construct a web request graph. (2) Due to a small percentage of normal requests that do not include a Referer field, we have proposed two methods, namely, redirection refactoring and URL similarity to add "missing" user-initiated requests into the web request graph and refine the web request graph.…”
Section: Introductionmentioning
confidence: 99%
“…Another graph inspired visualization is Hviz [19], which was used successfully by InfoSec Institute to explore and summarize HTTP requests to find common malware like Zeus [20], and also as a tool for forensic analysis [21]. Hviz deserves mention for its versatile use cases and also for creating a heuristic to aggregate HTTP requests by using Frequent Item Mining.…”
Section: Related Workmentioning
confidence: 99%
“…Many of event reconstruction methods in the literature use extracted data from hard disk [2-4, 6, 9, 10, 12-25]. However, there are event reconstruction techniques which are based on the extracted pieces of evidence from memory image [26][27][28][29] or network traffic [30][31][32]. It should be noted that, because of the permanent nature of hard disk data, the pieces of evidence which are extracted from hard disk are more reliable.…”
Section: Literature Reviewmentioning
confidence: 99%