Vis enkel innførsel

dc.contributor.advisorJiang, Yumingnb_NO
dc.contributor.advisorYlä-Jääski, Anttinb_NO
dc.contributor.advisorOslebo, Arnenb_NO
dc.contributor.advisorKnutsen, Mortennb_NO
dc.contributor.authorJin, Zhihuanb_NO
dc.date.accessioned2014-12-19T14:12:24Z
dc.date.available2014-12-19T14:12:24Z
dc.date.created2010-09-03nb_NO
dc.date.issued2008nb_NO
dc.identifier347722nb_NO
dc.identifierntnudaim:4141nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/261774
dc.description.abstractToday, enormous logging data monitoring the traffics of the Internet is generated everyday. However, the network administrators still have very limited insight into the logging data, mainly due to the lack of efficient analyzing approaches. Most of the existing network monitoring or analysis tools either mainly focus on the throughput of the network in order to assist network structure planning and optimization, which is too high level for security analysis, or dig to too low level into every packet, which is too inefficient in practice. Unfortunately, not all network traffics are legitimate. As a matter of fact, a lot of malicious traffics flow through the Internet all the time. Such malicious traffics can lead to various cyber-crimes, and exhaust considerable network bandwidth. The expression that what you do not see can hurt you perfectly suits the situation here. In order to help the network administrators to discover malicious activities in their network traffics, this thesis attempt to explore suitable visualization techniques to distinguish malicious traffics from massive background traffics by using visual patterns, to which the human visual perception system is sensitive and can thus processes efficiently. To achieve such goal, we first extract the visual patterns of malicious activities from known malicious traffics. Then, we look for the same visual patterns in the normal traffics. When the same visual pattern is found, we identify the relevant malicious activities. The tool used in our experimentation is designed and implemented according to the experiences learned from previous related works, with special regards to human visual perception theory. The result of our experimentation shows that some malicious activities which can not be easily identified in traditional analyzing approaches before, can be identified by our visualization system under certain conditions.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.subjectntnudaimno_NO
dc.subjectSIE7 kommunikasjonsteknologino_NO
dc.subjectTelematikkno_NO
dc.titleVisualization of Network Traffic to Detect Malicious Network Activitynb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber113nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel