visualizing real time network resource usage
play

Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, - PowerPoint PPT Presentation

Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, and Aaron Schulman Kyle King, and Aaron Schulman University of Maryland, Dept. of Computer Science Contact: cdunne@cs.umd.edu Workshop on


  1. Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, and Aaron Schulman Kyle King, and Aaron Schulman University of Maryland, Dept. of Computer Science Contact: cdunne@cs.umd.edu Workshop on Visualization for Computer Security September 15, 2008 Boston, MA

  2. Introduction • Computer network data – Adversarial behavior – Configuration problems – Unfair resource usage – Unfair resource usage • Visualization tools – Too much data – Cluttered – Hard to follow – Primary tools are text based

  3. Goals • Real-time • Visual stability • Identify local systems • Monitor behavior Monitor behavior – Attacks – Topology changes – Unusual network usage

  4. NetGrok http://www.youtube.com/watch?v=uCXPaNvl5Ok

  5. Contributions • Hashed layout • Grouped, home-centric layout • Treemap links without occlusion • Mouse-over and preferential edge display Mouse-over and preferential edge display • Visualization framework for real-time IP data

  6. Implementation Details • Java • Prefuse toolkit – Custom data structures and visualizations • JPCAP library • JPCAP library • Jigloo Eclipse plugin

  7. Professional Feedback • Expert user: • Use case meetings (2 x 1 hr + emails) • PCAP and live capture analysis (1 hr) • Likert scale questionnaire • Positive: – Filter sliders, esp. time histogram – Filter sliders, esp. time histogram – Intuitive layout and grouping – "NetGrok is excellent as a real-time diagnostic" • Criticisms: – Transport layer data (TCP/UDP) – Dynamic grouping – Animations – Treemaps interesting but not intuitive

  8. Future Work • Age off old data • More visualizations – Semantic substrates – Coarser views – Coarser views • Personal security tool

  9. Acknowledgments • Professor Ben Shneiderman our advisor • Brad Plecs our case study participant • Thomas Lotze, Joonghoon Lee, Michael VanDaniker, Fatemeh Mir Rashed, Abigail VanDaniker, Fatemeh Mir Rashed, Abigail Daken, Michael Lam, Huimin Guo, and Krist Wongsuphasawat our reviewers

  10. Contact Info • Website: www.cs.umd.edu/projects/netgrok/ • Email: cdunne@cs.umd.edu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend