Abstract
Detecting suspicious or malicious user behavior in large networks is an essential task for administrators which requires significant effort due to the huge amount of log data to be processed. However, several of these activities can be rapidly identified since they usually demonstrate periodic behavior. For instance, periodic activities by specific users accessing the billing system of a financial institution may conceal fraud. Detecting periodicity in user behavior not only offers security to the network, but may prevent future malicious activities. In this paper, we present visualization techniques that aim to detect authorized (or unauthorized) user activities that seem to appear at regular time intervals.
The work of E.N. Argyriou has been co-financed by the European Union (European Social Fund - ESF) and Greek national funds through the Operational Program “Education and Lifelong Learning” of the National Strategic Reference Framework (NSRF) - Research Funding Program: Heracleitus II. Investing in knowledge society through the European Social Fund.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mansman, F., Meier, L., Keim, D.A.: Visualization of host behavior for network security. In: VizSEC 2007, pp. 187–202. Springer, Heidelberg (2008)
Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: Visflowconnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, pp. 26–34. ACM, New York (2004)
Shabtai, A., Klimov, D., Shahar, Y., Elovici, Y.: An intelligent, interactive tool for exploration and visualization of time-oriented security data. In: Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, pp. 15–22. ACM (2006)
Lakkaraju, K., Yurcik, W., Lee, A.J.: Nvisionip: netflow visualizations of system state for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, pp. 65–72. ACM (2004)
Vandenberghe, G.: Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol. 5210, pp. 181–196. Springer, Heidelberg (2008)
Fink, G.A., North, C.: Root polar layout of internet address data for security administration. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 55–64. IEEE Computer Society (2005)
Abdullah, K., Lee, C., Conti, G., Copeland, J.A., Stasko, J.: Ids rainstorm: Visualizing ids alarms. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 1–10. IEEE Computer Society (2005)
Toelle, J., Niggemann, O.: Supporting intrusion detection by graph clustering and graph drawing. In. In: Proc. of 3rd Int. Workshop on Recent Advances in Intrusion Detection, RAID 2000 (2005)
Oline, A., Reiners, D.: Exploring three-dimensional visualization for intrusion detection. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 113–120. IEEE Computer Society (2005)
Erbacher, R.F., Christensen, K., Sundberg, A.: Designing visualization capabilities for ids challenges. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 121–127. IEEE Computer Society (2005)
Carlis, J.V., Konstan, J.A.: Interactive visualization of serial periodic data. In: Proceedings of the 11th Annual ACM Symposium on User Interface Software and Technology, UIST 1998, pp. 29–38. ACM (1998)
Weber, M., Alexa, M., Müller, W.: Visualizing time-series on spirals. In: Proceedings of the IEEE Symposium on Information Visualization 2001 (INFOVIS 2001), pp. 7–14 (2001)
Bertini, E., Hertzog, P., Lalanne, D.: Spiralview: Towards security policies assessment through visual correlation of network resources with evolution of alarms. In: Proceedings of the 2007 IEEE Symposium on Visual Analytics Science and Technology, VAST 2007, pp. 139–146. IEEE Computer Society (2007)
Silva, S.F., Catarci, T.: Visualization of linear time-oriented data: A survey. In: Proceedings of the First International Conference on Web Information Systems Engineering (WISE 2000), vol. 1, pp. 310–319. IEEE Computer Society (2000)
Müller, W., Schumann, H.: Visualization for modeling and simulation: visualization methods for time-dependent data - an overview. In: Proceedings of the 35th Conference on Winter Simulation: Driving Innovation, WSC 2003, pp. 737–745 (2003)
Aigner, W., Bertone, A., Miksch, S., Tominski, C., Schumann, H.: Towards a conceptual framework for visual analytics of time and time-oriented data. In: Proceedings of the 39th Conference on Winter Simulation: 40 Years! The Best is Yet to Come, WSC 2007, pp. 721–729 (2007)
Davidson, R., Harel, D.: Drawing graphs nicely using simulated annealing. ACM Transactions on Graphics 15, 301–331 (1996)
Eades, P.: A heuristic for graph drawing. Congressus Numerantium 42, 149–160 (1984)
Fruchterman, T., Reingold, E.M.: Graph drawing by force-directed placement. Software-Practice and Experience 21, 1129–1164 (1991)
Kamada, T., Kawai, S.: An algorithm for drawing general undirected graphs. Information Processing Letters 31, 7–15 (1989)
Kaufmann, M., Wagner, D. (eds.): Drawing Graphs. LNCS, vol. 2025. Springer, Heidelberg (2001)
Di Battista, G., Eades, P., Tamassia, R., Tollis, I.G.: Graph Drawing: Algorithms for the Visualization of Graphs. Prentice Hall (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Argyriou, E.N., Symvonis, A. (2012). Detecting Periodicity in Serial Data through Visualization. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2012. Lecture Notes in Computer Science, vol 7432. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33191-6_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-33191-6_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33190-9
Online ISBN: 978-3-642-33191-6
eBook Packages: Computer ScienceComputer Science (R0)