Abstract
This paper proposes a method of network packets visualization using mixed reality technology. The purpose of this visualization is to detect an IoT device that has been altered into a “bot” which performs DDoS attack. To achieve the objective, our solution addresses the following core concerns: (1) to clearly realize unusual situation that DDoS attack is happening, (2) to easily find which device is performing as a bot of DDoS attack, and (3) to immediately notice the beginning of DDoS attack in real-time. This paper introduces a visualization system that implements the above proposed method and presents some preliminary evaluation results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beitzel, S., Dykstra, J., Toliver, P., Youzwak, J.: Exploring 3D cybersecurity visualization with the microsoft HoloLens. In: Nicholson, D. (ed.) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol. 593, pp. 197–207. Springer, Cham (2018)
European Network and Information Security Agency: Major DDoS Attacks Involving IoT Devices (2016). https://www.enisa.europa.eu/publications/info-notes/major-ddos-attacks-involving-iot-devices
FORTINET: Fortinet Threat Map. https://threatmap.fortiguard.com/
Google and Arbor Networks: Digital Attack Map. http://www.digitalattackmap.com/
Gu, Q., Liu, P.: Denial of Service Attacks. Technical Report. http://s2.ist.psu.edu/paper/DDoS-Chap-Gu-June-07.pdf
Kaspersky: CYBERTHREAT REAL-TIME MAP. https://cybermap.kaspersky.com/
Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other Botnets. IEEE Comput. 50(7), 80–84 (2017)
Krebs, B.: Krebsonsecurity hit with record DDoS (2016). https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/
Mayer, S., Hassan, Y., Sörös, G.: Magic lenses for revealing device interactions in smart environments. In: SIGGRAPH Asia 2014 Mobile Graphics and Interactive Applications (SA 2014). ACM, New York Article 9, 6 p. (2014). https://doi.org/10.1145/2669062.2669077
McAfee Labs Threats Report, August 2019. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf
National Institute of Information and Communications Technology. https://www.nicter.jp
Shiravi, H., Shiravi, A., Ghorbani, A.: A survey of visualization systems for network security. IEEE Trans. Visual Comput. Graphics 18(8), 1313–1329 (2012)
Sparks, P.: The route to a trillion devices, white paper of ARM Limited (2017)
Suzuki, K., Eto, M., Inoue, D.: Development and evaluation of NIRVANA: real network traffic visualization system. J. National Institute Inf. Commun. Technol. 58, 61–77 (2011)
The Internet Engineering Task Force (RFC4732): Internet Denial-of-Service Considerations (2006). http://tools.ietf.org/html/rfc4732
Acknowledgement
This research was supported by Strategic International Research Cooperative Program, Japan Science and Technology Agency (JST) regarding “Security in the Internet of Things Space”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kaneko, K., Tsutsumi, Y., Sharma, S., Okada, Y. (2020). PACKUARIUM: Network Packet Visualization Using Mixed Reality for Detecting Bot IoT Device of DDoS Attack. In: Barolli, L., Okada, Y., Amato, F. (eds) Advances in Internet, Data and Web Technologies. EIDWT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 47. Springer, Cham. https://doi.org/10.1007/978-3-030-39746-3_38
Download citation
DOI: https://doi.org/10.1007/978-3-030-39746-3_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39745-6
Online ISBN: 978-3-030-39746-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)