Interactive Visualization for Network and Port Scan Detection

Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Muelder, Chris, Ma, Kwan-Liu, Bartoletti, Tony
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 283
container_issue
container_start_page 265
container_title
container_volume
creator Muelder, Chris
Ma, Kwan-Liu
Bartoletti, Tony
description Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous threat to a network. Several techniques exist to automatically detect scans, but these are mostly dependant on some threshold that an attacker could possibly avoid crossing. This paper presents a means to use visualization to detect scans interactively.
doi_str_mv 10.1007/11663812_14
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19685145</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19685145</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-32693a36983ceb8615b4fa9174dc3e3098fc2d4cb7e70293d34cb483caa428273</originalsourceid><addsrcrecordid>eNpVkDlPAzEUhM0lEYVU_AE3FBQLfn5eHwUFClekCJA4Wsvr9aIlYTeyDQh-PRuFAqaZkebTFEPIIbATYEydAkiJGrgFsUUmRmksBUNQysA2GYEEKBCF2fnXabFLRgwZL4wSuE8mKb2yQQhGSTYiZ7Muh-h8bj8CfW7Tu1u23y63fUebPtLbkD_7uKCuq-l9HzN98K6jFyEHv2YOyF7jlilMfn1Mnq4uH6c3xfzuejY9nxcrDiYXyKVBh9Jo9KHSEspKNM6AErXHgMzoxvNa-EoFxbjBGocsBtg5wTVXOCZHm92VS94tm-g63ya7iu2bi18WjNQliHLgjjdcGqruJURb9f0iWWB2faH9cyH-AAfRXHI</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Interactive Visualization for Network and Port Scan Detection</title><source>Springer Books</source><creator>Muelder, Chris ; Ma, Kwan-Liu ; Bartoletti, Tony</creator><contributor>Zamboni, Diego ; Valdes, Alfonso</contributor><creatorcontrib>Muelder, Chris ; Ma, Kwan-Liu ; Bartoletti, Tony ; Zamboni, Diego ; Valdes, Alfonso</creatorcontrib><description>Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous threat to a network. Several techniques exist to automatically detect scans, but these are mostly dependant on some threshold that an attacker could possibly avoid crossing. This paper presents a means to use visualization to detect scans interactively.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540317784</identifier><identifier>ISBN: 3540317783</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540317791</identifier><identifier>EISBN: 3540317791</identifier><identifier>DOI: 10.1007/11663812_14</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; information visualization ; intrusion detection ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; network scans ; Network security ; port scans ; Software ; user interfaces</subject><ispartof>Lecture notes in computer science, 2006, p.265-283</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11663812_14$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11663812_14$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4047,4048,27923,38253,41440,42509</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19685145$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Zamboni, Diego</contributor><contributor>Valdes, Alfonso</contributor><creatorcontrib>Muelder, Chris</creatorcontrib><creatorcontrib>Ma, Kwan-Liu</creatorcontrib><creatorcontrib>Bartoletti, Tony</creatorcontrib><title>Interactive Visualization for Network and Port Scan Detection</title><title>Lecture notes in computer science</title><description>Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous threat to a network. Several techniques exist to automatically detect scans, but these are mostly dependant on some threshold that an attacker could possibly avoid crossing. This paper presents a means to use visualization to detect scans interactively.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>information visualization</subject><subject>intrusion detection</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>network scans</subject><subject>Network security</subject><subject>port scans</subject><subject>Software</subject><subject>user interfaces</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540317784</isbn><isbn>3540317783</isbn><isbn>9783540317791</isbn><isbn>3540317791</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkDlPAzEUhM0lEYVU_AE3FBQLfn5eHwUFClekCJA4Wsvr9aIlYTeyDQh-PRuFAqaZkebTFEPIIbATYEydAkiJGrgFsUUmRmksBUNQysA2GYEEKBCF2fnXabFLRgwZL4wSuE8mKb2yQQhGSTYiZ7Muh-h8bj8CfW7Tu1u23y63fUebPtLbkD_7uKCuq-l9HzN98K6jFyEHv2YOyF7jlilMfn1Mnq4uH6c3xfzuejY9nxcrDiYXyKVBh9Jo9KHSEspKNM6AErXHgMzoxvNa-EoFxbjBGocsBtg5wTVXOCZHm92VS94tm-g63ya7iu2bi18WjNQliHLgjjdcGqruJURb9f0iWWB2faH9cyH-AAfRXHI</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Muelder, Chris</creator><creator>Ma, Kwan-Liu</creator><creator>Bartoletti, Tony</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Interactive Visualization for Network and Port Scan Detection</title><author>Muelder, Chris ; Ma, Kwan-Liu ; Bartoletti, Tony</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-32693a36983ceb8615b4fa9174dc3e3098fc2d4cb7e70293d34cb483caa428273</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>information visualization</topic><topic>intrusion detection</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>network scans</topic><topic>Network security</topic><topic>port scans</topic><topic>Software</topic><topic>user interfaces</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Muelder, Chris</creatorcontrib><creatorcontrib>Ma, Kwan-Liu</creatorcontrib><creatorcontrib>Bartoletti, Tony</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Muelder, Chris</au><au>Ma, Kwan-Liu</au><au>Bartoletti, Tony</au><au>Zamboni, Diego</au><au>Valdes, Alfonso</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Interactive Visualization for Network and Port Scan Detection</atitle><btitle>Lecture notes in computer science</btitle><date>2006</date><risdate>2006</risdate><spage>265</spage><epage>283</epage><pages>265-283</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540317784</isbn><isbn>3540317783</isbn><eisbn>9783540317791</eisbn><eisbn>3540317791</eisbn><abstract>Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect such scans can help identify a more dangerous threat to a network. Several techniques exist to automatically detect scans, but these are mostly dependant on some threshold that an attacker could possibly avoid crossing. This paper presents a means to use visualization to detect scans interactively.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11663812_14</doi><tpages>19</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2006, p.265-283
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19685145
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
information visualization
intrusion detection
Memory and file management (including protection and security)
Memory organisation. Data processing
network scans
Network security
port scans
Software
user interfaces
title Interactive Visualization for Network and Port Scan Detection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T11%3A29%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Interactive%20Visualization%20for%20Network%20and%20Port%20Scan%20Detection&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Muelder,%20Chris&rft.date=2006&rft.spage=265&rft.epage=283&rft.pages=265-283&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540317784&rft.isbn_list=3540317783&rft_id=info:doi/10.1007/11663812_14&rft_dat=%3Cpascalfrancis_sprin%3E19685145%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540317791&rft.eisbn_list=3540317791&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true