visualizing real time network resource usage
play

Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, - PowerPoint PPT Presentation

Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, and Aaron Schulman Kyle King, and Aaron Schulman University of Maryland, Dept. of Computer Science Contact: cdunne@cs.umd.edu Workshop on


  1. Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, and Aaron Schulman Kyle King, and Aaron Schulman University of Maryland, Dept. of Computer Science Contact: cdunne@cs.umd.edu Workshop on Visualization for Computer Security September 15, 2008 Boston, MA

  2. Introduction • Computer network data – Adversarial behavior – Configuration problems – Unfair resource usage – Unfair resource usage • Visualization tools – Too much data – Cluttered – Hard to follow – Primary tools are text based

  3. Goals • Real-time • Visual stability • Identify local systems • Monitor behavior Monitor behavior – Attacks – Topology changes – Unusual network usage

  4. NetGrok http://www.youtube.com/watch?v=uCXPaNvl5Ok

  5. Contributions • Hashed layout • Grouped, home-centric layout • Treemap links without occlusion • Mouse-over and preferential edge display Mouse-over and preferential edge display • Visualization framework for real-time IP data

  6. Implementation Details • Java • Prefuse toolkit – Custom data structures and visualizations • JPCAP library • JPCAP library • Jigloo Eclipse plugin

  7. Professional Feedback • Expert user: • Use case meetings (2 x 1 hr + emails) • PCAP and live capture analysis (1 hr) • Likert scale questionnaire • Positive: – Filter sliders, esp. time histogram – Filter sliders, esp. time histogram – Intuitive layout and grouping – "NetGrok is excellent as a real-time diagnostic" • Criticisms: – Transport layer data (TCP/UDP) – Dynamic grouping – Animations – Treemaps interesting but not intuitive

  8. Future Work • Age off old data • More visualizations – Semantic substrates – Coarser views – Coarser views • Personal security tool

  9. Acknowledgments • Professor Ben Shneiderman our advisor • Brad Plecs our case study participant • Thomas Lotze, Joonghoon Lee, Michael VanDaniker, Fatemeh Mir Rashed, Abigail VanDaniker, Fatemeh Mir Rashed, Abigail Daken, Michael Lam, Huimin Guo, and Krist Wongsuphasawat our reviewers

  10. Contact Info • Website: www.cs.umd.edu/projects/netgrok/ • Email: cdunne@cs.umd.edu

Recommend


More recommend