A user-centered approach to visualizing network traffic for intrusion detection

  • Authors:
  • John R. Goodall;A. Ant Ozok;Wayne G. Lutters;Penny Rheingans;Anita Komlodi

  • Affiliations:
  • UMBC, Baltimore, MD;UMBC, Baltimore, MD;UMBC, Baltimore, MD;UMBC, Baltimore, MD;UMBC, Baltimore, MD

  • Venue:
  • CHI '05 Extended Abstracts on Human Factors in Computing Systems
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion detection (ID) analysts are charged with ensuring the safety and integrity of today's high-speed computer networks. Their work includes the complex task of searching for indications of attacks and misuse in vast amounts of network data. Although there are several information visualization tools to support ID, few are grounded in a thorough understanding of the work ID analysts perform or include any empirical evaluation. We present a user-centered visualization based on our understanding of the work of ID and the needs of analysts derived from the first significant user study of ID. The tool presents analysts with both 'at a glance' understanding of network activity, and low-level network link details. Results from preliminary usability testing show that users performed better and found easier those tasks dealing with network state in comparison to network link tasks.