Skip to main content
Log in

Applied parallel coordinates for logs and network traffic attack analysis

  • Original Paper
  • Published:
Journal in Computer Virology Aims and scope Submit manuscript

Abstract

By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be described and known attacks are usually signatures. Parallel coordinates plot offers a new way to deal with such a vast amount of events and event types: instead of working with an alert system, an image is generated so that issues can be visualized. By simply looking at this image, one can see line patterns with particular color, thickness, frequency, or convergence behavior that gives evidence of subtle data correlation. This paper first starts with the mathematical theory needed to understand the power of such a system and later introduces the Picviz software which implements part of it. Picviz dissects acquired data into a graph description language to make a parallel coordinate picture of it. Its architecture and features are covered with examples of how it can be used to discover security related issues.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Conti, G., Abdullah, K.: Passive visual fingerprinting of network attack tools. In: VizSEC/DMSEC ’04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 45–54. ACM, New York, NY, USA (2004)

  2. Gansner E.R., Koutsofios E., North S.C., Phong Vo K.: A technique for drawing directed graphs. IEEE Trans. Softw. Eng. 19, 214–230 (1993)

    Article  Google Scholar 

  3. Grinstein, G., Mihalisin, T., Hinterberger, H., Inselberg, A.: Visualizing multidimensional (multivariate) data and relations. In: VIS ’94: Proceedings of the Conference on Visualization ’94, pp. 404–409. IEEE Computer Society Press, Los Alamitos, CA, USA (1994)

  4. Hamming R.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29, 147–160 (1950)

    MathSciNet  Google Scholar 

  5. Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: LEET’08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1–9. USENIX Association, Berkeley, CA, USA (2008)

  6. Inselberg, A., Avidan, T.: The automated multidimensional detective. In: INFOVIS ’99: Proceedings of the 1999 IEEE Symposium on Information Visualization, p. 112. IEEE Computer Society, Washington, DC, USA (1999)

  7. Inselberg, A., Avidan, T.: Classification and visualization for high-dimensional data. In: KDD ’00: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 370–374. ACM, New York, NY, USA (2000)

  8. Inselberg, A., Dimsdale, B.: Parallel coordinates for visualizing multi-dimensional geometry. In: CG International ’87 on Computer Graphics 1987, pp. 25–44. Springer, New York, NY, USA (1987)

  9. Inselberg A., Dimsdale B.: Multidimensional lines ii: proximity and applications. SIAM J. Appl. Math. 54(2), 578–596 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  10. Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Tech. Rep. 8 (1966)

  11. Stubblefield A., Ioannidis J., Rubin A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur. 7(2), 319–332 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philippe Saadé.

Additional information

A picture a day keeps the doctor away.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tricaud, S., Saadé, P. Applied parallel coordinates for logs and network traffic attack analysis. J Comput Virol 6, 1–29 (2010). https://doi.org/10.1007/s11416-009-0127-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-009-0127-3

Keywords

Navigation