skip to main content
10.1145/3099012.3099017acmotherconferencesArticle/Chapter ViewAbstractPublication PagesshcisConference Proceedingsconference-collections
research-article

Towards a Generic Architecture for Interactive Cost-Aware Visualization of Monitoring Data in Distributed Systems

Published:19 June 2017Publication History

ABSTRACT

The collection of monitoring data in distributed systems can serve many different purposes, such as system status monitoring, performance evaluation, and optimization. There are many well-established approaches for data collection and visualization in these areas. For objectives such as debugging complex distributed applications, in-depth analysis of malicious attacks, and forensic investigations, the joint analysis and visualization of a large variety of data gathered at different layers of the system is of great value. The utilization of heavy-weight monitoring techniques requires a cost-aware on-demand activation of such monitoring.

We present an architecture for an interactive and cost-aware visualization of monitoring data combined from multiple sources in distributed systems. We introduce two distinguishing properties: the possibilities to reconfigure data collection and a cost prediction mechanism that supports the user in a cost-aware, dynamic activation of monitoring components in an interactive in-depth analysis. We illustrate the use of such cost prediction for monitoring using VMI-based mechanisms.

References

  1. Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee. 2008. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and communications security. ACM, 51--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Glenn A. Fink, Paul Muessig, and Chris North. 2005. Visual correlation of host processes and network traffic. In IEEE Workshop on Visualization for Computer Security (VizSEC'05). IEEE, 11--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Tal Garfinkel, Mendel Rosenblum, and others. 2003. A Virtual Machine Introspection Based Architecture for Intrusion Detection.. In Proceedings of Network and Distributed System Security Symposium (NDSS), Vol. 3. 191--206.Google ScholarGoogle Scholar
  4. J. Kreps, N. Narkhede, and J. Rao. 2011. Kafka: A distributed messaging system for log processing. In Proceedings of 6th International Workshop on Networking Meets Databases (NetDB), Athens, Greece.Google ScholarGoogle Scholar
  5. Florian Mansmann, Timo Göbel, and William Cheswick. 2012. Visual analysis of complex firewall configurations. In Proceedings of the 9th International Symposium on Visualization for Cyber Security (VizSec '12). ACM, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jonas Pfoh, Christian Schneider, and Claudia Eckert. 2011. Nitro: Hardware-based system call tracing for virtual machines. In International Workshop on Security. Springer, 96--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Josh Saxe, David Mentis, and Chris Greamo. 2012. Visualization of Shared System Call Sequence Relationships in Large Malware Corpora. In Proceedings of the 9th International Symposium on Visualization for Cyber Security (VizSec '12). ACM, New York, NY, USA, 33--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hadi Shiravi, Ali Shiravi, and Ali A Ghorbani. 2012. A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics 18, 8 (2012), 1313--1329. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Joe Sylve. 2012. Lime-linux memory extractor. In ShmooCon'12.Google ScholarGoogle Scholar
  10. Teryl Taylor, Stephen Brooks, and John McHugh. 2008. NetBytes viewer: An entity-based netflow visualization utility for identifying intrusive behavior. In Proceedings of International Symposium on Visualization for Cyber Security. Springer, 101--114.Google ScholarGoogle ScholarCross RefCross Ref
  11. Markus Wagner, Fabian Fischer, Robert Luh, Andrea Haberson, Alexander Rind, Daniel A Keim, Wolfgang Aigner, Rita Borgo, Fabio Ganovelli, and Ivan Viola. 2015. A survey of visualization systems for malware analysis. In EG Conference on Visualization (EuroVis)-STARs. 105--125.Google ScholarGoogle Scholar
  12. Tobias Wüchner, Alexander Pretschner, and Martín Ochoa. 2014. DAVAST: Data-centric System Level Activity Visualization. In Proceedings of the Eleventh Workshop on Visualization for Cyber Security (VizSec '14). ACM, New York, NY, USA, 25--32. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards a Generic Architecture for Interactive Cost-Aware Visualization of Monitoring Data in Distributed Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SHCIS '17: Proceedings of the 4th Workshop on Security in Highly Connected IT Systems
          June 2017
          53 pages
          ISBN:9781450352710
          DOI:10.1145/3099012

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 June 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          SHCIS '17 Paper Acceptance Rate8of11submissions,73%Overall Acceptance Rate8of11submissions,73%
        • Article Metrics

          • Downloads (Last 12 months)9
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader