Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 283 |
---|---|
container_issue | |
container_start_page | 265 |
container_title | |
container_volume | |
creator | Muelder, Chris Ma, Kwan-Liu Bartoletti, Tony |
description | Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous threat to a network. Several techniques exist to automatically detect scans, but these are mostly dependant on some threshold that an attacker could possibly avoid crossing. This paper presents a means to use visualization to detect scans interactively. |
doi_str_mv | 10.1007/11663812_14 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19685145</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19685145</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-32693a36983ceb8615b4fa9174dc3e3098fc2d4cb7e70293d34cb483caa428273</originalsourceid><addsrcrecordid>eNpVkDlPAzEUhM0lEYVU_AE3FBQLfn5eHwUFClekCJA4Wsvr9aIlYTeyDQh-PRuFAqaZkebTFEPIIbATYEydAkiJGrgFsUUmRmksBUNQysA2GYEEKBCF2fnXabFLRgwZL4wSuE8mKb2yQQhGSTYiZ7Muh-h8bj8CfW7Tu1u23y63fUebPtLbkD_7uKCuq-l9HzN98K6jFyEHv2YOyF7jlilMfn1Mnq4uH6c3xfzuejY9nxcrDiYXyKVBh9Jo9KHSEspKNM6AErXHgMzoxvNa-EoFxbjBGocsBtg5wTVXOCZHm92VS94tm-g63ya7iu2bi18WjNQliHLgjjdcGqruJURb9f0iWWB2faH9cyH-AAfRXHI</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Interactive Visualization for Network and Port Scan Detection</title><source>Springer Books</source><creator>Muelder, Chris ; Ma, Kwan-Liu ; Bartoletti, Tony</creator><contributor>Zamboni, Diego ; Valdes, Alfonso</contributor><creatorcontrib>Muelder, Chris ; Ma, Kwan-Liu ; Bartoletti, Tony ; Zamboni, Diego ; Valdes, Alfonso</creatorcontrib><description>Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous threat to a network. Several techniques exist to automatically detect scans, but these are mostly dependant on some threshold that an attacker could possibly avoid crossing. This paper presents a means to use visualization to detect scans interactively.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540317784</identifier><identifier>ISBN: 3540317783</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540317791</identifier><identifier>EISBN: 3540317791</identifier><identifier>DOI: 10.1007/11663812_14</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; information visualization ; intrusion detection ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; network scans ; Network security ; port scans ; Software ; user interfaces</subject><ispartof>Lecture notes in computer science, 2006, p.265-283</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11663812_14$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11663812_14$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4047,4048,27923,38253,41440,42509</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19685145$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Zamboni, Diego</contributor><contributor>Valdes, Alfonso</contributor><creatorcontrib>Muelder, Chris</creatorcontrib><creatorcontrib>Ma, Kwan-Liu</creatorcontrib><creatorcontrib>Bartoletti, Tony</creatorcontrib><title>Interactive Visualization for Network and Port Scan Detection</title><title>Lecture notes in computer science</title><description>Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous threat to a network. Several techniques exist to automatically detect scans, but these are mostly dependant on some threshold that an attacker could possibly avoid crossing. This paper presents a means to use visualization to detect scans interactively.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>information visualization</subject><subject>intrusion detection</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>network scans</subject><subject>Network security</subject><subject>port scans</subject><subject>Software</subject><subject>user interfaces</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540317784</isbn><isbn>3540317783</isbn><isbn>9783540317791</isbn><isbn>3540317791</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkDlPAzEUhM0lEYVU_AE3FBQLfn5eHwUFClekCJA4Wsvr9aIlYTeyDQh-PRuFAqaZkebTFEPIIbATYEydAkiJGrgFsUUmRmksBUNQysA2GYEEKBCF2fnXabFLRgwZL4wSuE8mKb2yQQhGSTYiZ7Muh-h8bj8CfW7Tu1u23y63fUebPtLbkD_7uKCuq-l9HzN98K6jFyEHv2YOyF7jlilMfn1Mnq4uH6c3xfzuejY9nxcrDiYXyKVBh9Jo9KHSEspKNM6AErXHgMzoxvNa-EoFxbjBGocsBtg5wTVXOCZHm92VS94tm-g63ya7iu2bi18WjNQliHLgjjdcGqruJURb9f0iWWB2faH9cyH-AAfRXHI</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Muelder, Chris</creator><creator>Ma, Kwan-Liu</creator><creator>Bartoletti, Tony</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Interactive Visualization for Network and Port Scan Detection</title><author>Muelder, Chris ; Ma, Kwan-Liu ; Bartoletti, Tony</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-32693a36983ceb8615b4fa9174dc3e3098fc2d4cb7e70293d34cb483caa428273</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>information visualization</topic><topic>intrusion detection</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>network scans</topic><topic>Network security</topic><topic>port scans</topic><topic>Software</topic><topic>user interfaces</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Muelder, Chris</creatorcontrib><creatorcontrib>Ma, Kwan-Liu</creatorcontrib><creatorcontrib>Bartoletti, Tony</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Muelder, Chris</au><au>Ma, Kwan-Liu</au><au>Bartoletti, Tony</au><au>Zamboni, Diego</au><au>Valdes, Alfonso</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Interactive Visualization for Network and Port Scan Detection</atitle><btitle>Lecture notes in computer science</btitle><date>2006</date><risdate>2006</risdate><spage>265</spage><epage>283</epage><pages>265-283</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540317784</isbn><isbn>3540317783</isbn><eisbn>9783540317791</eisbn><eisbn>3540317791</eisbn><abstract>Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous threat to a network. Several techniques exist to automatically detect scans, but these are mostly dependant on some threshold that an attacker could possibly avoid crossing. This paper presents a means to use visualization to detect scans interactively.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11663812_14</doi><tpages>19</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2006, p.265-283 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19685145 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Computer systems and distributed systems. User interface Exact sciences and technology information visualization intrusion detection Memory and file management (including protection and security) Memory organisation. Data processing network scans Network security port scans Software user interfaces |
title | Interactive Visualization for Network and Port Scan Detection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T11%3A29%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Interactive%20Visualization%20for%20Network%20and%20Port%20Scan%20Detection&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Muelder,%20Chris&rft.date=2006&rft.spage=265&rft.epage=283&rft.pages=265-283&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540317784&rft.isbn_list=3540317783&rft_id=info:doi/10.1007/11663812_14&rft_dat=%3Cpascalfrancis_sprin%3E19685145%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540317791&rft.eisbn_list=3540317791&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |