- Title
- Wireless Security Tools
- Creator
- Janse van Rensburg, Johanna, Irwin, Barry V W
- Subject
- To be catalogued
- Date
- 2006
- Type
- text
- Type
- article
- Identifier
- http://hdl.handle.net/10962/429867
- Identifier
- vital:72647
- Identifier
- https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description
- Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Format
- 8 pages, pdf
- Language
- English
- Relation
- Computer Science, van Rensburg, J.J. and Irwin, B., 2006. Wireless Security Tools. Computer Science, 83(944), p.3924, Computer Science volume 83 number 944 1 8 2006 Journal
- Rights
- Publisher
- Rights
- Use of this resource is governed by the terms and conditions of the IEEE Xplore Terms of Use Statement (https://ieeexplore.ieee.org/Xplorehelp/overview-of-ieee-xplore/terms-of-use)
- Hits: 88
- Visitors: 89
- Downloads: 4
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details | SOURCE1 | Wireless Security Tools.pdf | 806 KB | Adobe Acrobat PDF | View Details |