ABSTRACT
The collection of monitoring data in distributed systems can serve many different purposes, such as system status monitoring, performance evaluation, and optimization. There are many well-established approaches for data collection and visualization in these areas. For objectives such as debugging complex distributed applications, in-depth analysis of malicious attacks, and forensic investigations, the joint analysis and visualization of a large variety of data gathered at different layers of the system is of great value. The utilization of heavy-weight monitoring techniques requires a cost-aware on-demand activation of such monitoring.
We present an architecture for an interactive and cost-aware visualization of monitoring data combined from multiple sources in distributed systems. We introduce two distinguishing properties: the possibilities to reconfigure data collection and a cost prediction mechanism that supports the user in a cost-aware, dynamic activation of monitoring components in an interactive in-depth analysis. We illustrate the use of such cost prediction for monitoring using VMI-based mechanisms.
- Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee. 2008. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and communications security. ACM, 51--62. Google ScholarDigital Library
- Glenn A. Fink, Paul Muessig, and Chris North. 2005. Visual correlation of host processes and network traffic. In IEEE Workshop on Visualization for Computer Security (VizSEC'05). IEEE, 11--19. Google ScholarDigital Library
- Tal Garfinkel, Mendel Rosenblum, and others. 2003. A Virtual Machine Introspection Based Architecture for Intrusion Detection.. In Proceedings of Network and Distributed System Security Symposium (NDSS), Vol. 3. 191--206.Google Scholar
- J. Kreps, N. Narkhede, and J. Rao. 2011. Kafka: A distributed messaging system for log processing. In Proceedings of 6th International Workshop on Networking Meets Databases (NetDB), Athens, Greece.Google Scholar
- Florian Mansmann, Timo Göbel, and William Cheswick. 2012. Visual analysis of complex firewall configurations. In Proceedings of the 9th International Symposium on Visualization for Cyber Security (VizSec '12). ACM, 1--8. Google ScholarDigital Library
- Jonas Pfoh, Christian Schneider, and Claudia Eckert. 2011. Nitro: Hardware-based system call tracing for virtual machines. In International Workshop on Security. Springer, 96--112. Google ScholarDigital Library
- Josh Saxe, David Mentis, and Chris Greamo. 2012. Visualization of Shared System Call Sequence Relationships in Large Malware Corpora. In Proceedings of the 9th International Symposium on Visualization for Cyber Security (VizSec '12). ACM, New York, NY, USA, 33--40. Google ScholarDigital Library
- Hadi Shiravi, Ali Shiravi, and Ali A Ghorbani. 2012. A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics 18, 8 (2012), 1313--1329. Google ScholarDigital Library
- Joe Sylve. 2012. Lime-linux memory extractor. In ShmooCon'12.Google Scholar
- Teryl Taylor, Stephen Brooks, and John McHugh. 2008. NetBytes viewer: An entity-based netflow visualization utility for identifying intrusive behavior. In Proceedings of International Symposium on Visualization for Cyber Security. Springer, 101--114.Google ScholarCross Ref
- Markus Wagner, Fabian Fischer, Robert Luh, Andrea Haberson, Alexander Rind, Daniel A Keim, Wolfgang Aigner, Rita Borgo, Fabio Ganovelli, and Ivan Viola. 2015. A survey of visualization systems for malware analysis. In EG Conference on Visualization (EuroVis)-STARs. 105--125.Google Scholar
- Tobias Wüchner, Alexander Pretschner, and Martín Ochoa. 2014. DAVAST: Data-centric System Level Activity Visualization. In Proceedings of the Eleventh Workshop on Visualization for Cyber Security (VizSec '14). ACM, New York, NY, USA, 25--32. Google ScholarDigital Library
Index Terms
- Towards a Generic Architecture for Interactive Cost-Aware Visualization of Monitoring Data in Distributed Systems
Recommendations
A Model and Framework for Visualization Exploration
Visualization exploration is the process of extracting insight from data via interaction with visual depictions of that data. Visualization exploration is more than presentation; the interaction with both the data and its depiction is as important as ...
Interactive Data Visualization to Understand Data Better: Case Studies in Healthcare System
This paper focuses on interactive data visualization techniques and their applications in healthcare systems. Interactive data visualization is a collection of techniques translating data from its numeric format to graphic presentation dynamically for ...
Interactive visualization for OLAP
ICCSA'05: Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IIIBusiness data collection is growing exponentially in recent years. A variety of industries and businesses have adopted new technologies of data storages such as data warehouses. On Line Analytical Processing (OLAP) has become an important tool for ...
Comments