Skip to main content

Detecting Periodicity in Serial Data through Visualization

  • Conference paper
Advances in Visual Computing (ISVC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 7432))

Included in the following conference series:

Abstract

Detecting suspicious or malicious user behavior in large networks is an essential task for administrators which requires significant effort due to the huge amount of log data to be processed. However, several of these activities can be rapidly identified since they usually demonstrate periodic behavior. For instance, periodic activities by specific users accessing the billing system of a financial institution may conceal fraud. Detecting periodicity in user behavior not only offers security to the network, but may prevent future malicious activities. In this paper, we present visualization techniques that aim to detect authorized (or unauthorized) user activities that seem to appear at regular time intervals.

The work of E.N. Argyriou has been co-financed by the European Union (European Social Fund - ESF) and Greek national funds through the Operational Program “Education and Lifelong Learning” of the National Strategic Reference Framework (NSRF) - Research Funding Program: Heracleitus II. Investing in knowledge society through the European Social Fund.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mansman, F., Meier, L., Keim, D.A.: Visualization of host behavior for network security. In: VizSEC 2007, pp. 187–202. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: Visflowconnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, pp. 26–34. ACM, New York (2004)

    Chapter  Google Scholar 

  3. Shabtai, A., Klimov, D., Shahar, Y., Elovici, Y.: An intelligent, interactive tool for exploration and visualization of time-oriented security data. In: Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, pp. 15–22. ACM (2006)

    Google Scholar 

  4. Lakkaraju, K., Yurcik, W., Lee, A.J.: Nvisionip: netflow visualizations of system state for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, pp. 65–72. ACM (2004)

    Google Scholar 

  5. Vandenberghe, G.: Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol. 5210, pp. 181–196. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Fink, G.A., North, C.: Root polar layout of internet address data for security administration. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 55–64. IEEE Computer Society (2005)

    Google Scholar 

  7. Abdullah, K., Lee, C., Conti, G., Copeland, J.A., Stasko, J.: Ids rainstorm: Visualizing ids alarms. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 1–10. IEEE Computer Society (2005)

    Google Scholar 

  8. Toelle, J., Niggemann, O.: Supporting intrusion detection by graph clustering and graph drawing. In. In: Proc. of 3rd Int. Workshop on Recent Advances in Intrusion Detection, RAID 2000 (2005)

    Google Scholar 

  9. Oline, A., Reiners, D.: Exploring three-dimensional visualization for intrusion detection. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 113–120. IEEE Computer Society (2005)

    Google Scholar 

  10. Erbacher, R.F., Christensen, K., Sundberg, A.: Designing visualization capabilities for ids challenges. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 121–127. IEEE Computer Society (2005)

    Google Scholar 

  11. Carlis, J.V., Konstan, J.A.: Interactive visualization of serial periodic data. In: Proceedings of the 11th Annual ACM Symposium on User Interface Software and Technology, UIST 1998, pp. 29–38. ACM (1998)

    Google Scholar 

  12. Weber, M., Alexa, M., Müller, W.: Visualizing time-series on spirals. In: Proceedings of the IEEE Symposium on Information Visualization 2001 (INFOVIS 2001), pp. 7–14 (2001)

    Google Scholar 

  13. Bertini, E., Hertzog, P., Lalanne, D.: Spiralview: Towards security policies assessment through visual correlation of network resources with evolution of alarms. In: Proceedings of the 2007 IEEE Symposium on Visual Analytics Science and Technology, VAST 2007, pp. 139–146. IEEE Computer Society (2007)

    Google Scholar 

  14. Silva, S.F., Catarci, T.: Visualization of linear time-oriented data: A survey. In: Proceedings of the First International Conference on Web Information Systems Engineering (WISE 2000), vol. 1, pp. 310–319. IEEE Computer Society (2000)

    Google Scholar 

  15. Müller, W., Schumann, H.: Visualization for modeling and simulation: visualization methods for time-dependent data - an overview. In: Proceedings of the 35th Conference on Winter Simulation: Driving Innovation, WSC 2003, pp. 737–745 (2003)

    Google Scholar 

  16. Aigner, W., Bertone, A., Miksch, S., Tominski, C., Schumann, H.: Towards a conceptual framework for visual analytics of time and time-oriented data. In: Proceedings of the 39th Conference on Winter Simulation: 40 Years! The Best is Yet to Come, WSC 2007, pp. 721–729 (2007)

    Google Scholar 

  17. Davidson, R., Harel, D.: Drawing graphs nicely using simulated annealing. ACM Transactions on Graphics 15, 301–331 (1996)

    Article  Google Scholar 

  18. Eades, P.: A heuristic for graph drawing. Congressus Numerantium 42, 149–160 (1984)

    MathSciNet  Google Scholar 

  19. Fruchterman, T., Reingold, E.M.: Graph drawing by force-directed placement. Software-Practice and Experience 21, 1129–1164 (1991)

    Article  Google Scholar 

  20. Kamada, T., Kawai, S.: An algorithm for drawing general undirected graphs. Information Processing Letters 31, 7–15 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  21. Kaufmann, M., Wagner, D. (eds.): Drawing Graphs. LNCS, vol. 2025. Springer, Heidelberg (2001)

    MATH  Google Scholar 

  22. Di Battista, G., Eades, P., Tamassia, R., Tollis, I.G.: Graph Drawing: Algorithms for the Visualization of Graphs. Prentice Hall (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Argyriou, E.N., Symvonis, A. (2012). Detecting Periodicity in Serial Data through Visualization. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2012. Lecture Notes in Computer Science, vol 7432. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33191-6_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33191-6_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33190-9

  • Online ISBN: 978-3-642-33191-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics