Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, and Aaron Schulman University of Maryland, Dept. of Computer.

Slides:



Advertisements
Similar presentations
Max Mustermann Folientitel Veranstaltung Online Steering of HEP Applications Daniel Lorenz University of Siegen Cracow Grid Workshop –
Advertisements

Pie(s) in the Sky Mark Crovella Boston University Computer Science.
SharePoint Forms All you ever wanted to know about forms but were afraid to ask.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. The Web Services Modeling Toolkit Mick Kerrigan.
Prefuse: A Toolkit for Interactive Information Visualization Heer, J., Card, S.K., Landay, J.A. Presented by Julia West.
Visualization of Mobile Agents Project Update Ken Deeter CPSC 533C.
Interactive Visualization of Small World Graphs An implementation in prefuse.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Prefuse: A Toolkit for Interactive Information Visualization Jeffrey Heer Stuart K. Card James A. Landay CHI2005.
NAV Project Update By: Meghan Allen and Peter McLachlan.
Readability Metrics for Network Visualization Cody Dunne and Ben Shneiderman Human-Computer Interaction Lab & Department of Computer Science University.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 Network Analysis Visualization (NAV) Meghan Allen and Peter McLachlan December 15, 2004.
December 19, 2005Presented By: Shawn Minto Mylog By Shawn Minto.
CHIME: A Metadata-Based Distributed Software Development Environment Stephen E. Dossick Dept. of Computer Science Columbia University
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Law Enforcement Resource Allocation (LERA) Visualization System Michael Welsman-Dinelle April Webster.
Teaching Object-Oriented Concepts Through GUI Programming Jesse M. Heines Martin J. Schedlbauer Dept. of Computer Science Univ. of Massachusetts Lowell.
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
Computer Science (CS) Department Website Revision Final Report Alfredo Tigolo III.
Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, and Aaron Schulman University of Maryland, Dept. of Computer.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
SOCIAL NETWORK ANALYSIS basic concepts and techniques.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
© 2006, The Technology FirmWWW.THETECHFIRM.COM 1 WINDOWS XP SUPPORT TOOLS.
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
SUNIL GAHLAWAT LU GAN MIYA SYLVESTER YIRAN WANG Usability and Utility of TopicLens a Visualization System for the Exploration of Topic Models.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Windows 7 Firewall.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Corporate Overview. Established in 1999 as development partner of IBM California based with R&D facility located in Timisoara, Romania Grown to over 270.
The Network Performance Advisor J. W. Ferguson NLANR/DAST & NCSA.
ACT: Attachment Chain Tracing Scheme for Virus Detection and Control Jintao Xiong Proceedings of the 2004 ACM workshop on Rapid malcode Presented.
Readability Metrics for Network Visualization Cody Dunne and Ben Shneiderman Human-Computer Interaction Lab & Department of Computer Science University.
Selected Topics in Software Engineering - Distributed Software Development.
I-Path : Network Transparency Project Shigeki Goto* Akihiro Shimoda*, Ichiro Murase* Dai Mochinaga**, and Katsushi Kobayashi*** 1 * Waseda University **
D AFFODIL Strategic Support Evaluated Claus-Peter Klas Norbert Fuhr Andre Schaefer University of Duisburg-Essen.
Introducing HingX now with Capacity Development Network.
Connect. Communicate. Collaborate Place organisation and project logos in this area AAIEye – A Monitoring Tool For AAI’s Mika Suvanto, CSC TNC 2008, Bruges.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
GO-ESSP Workshop, LLNL, Livermore, CA, Jun 19-21, 2006, Center for ATmosphere sciences and Earthquake Researches Construction of e-science Environment.
ABone Architecture and Operation ABCd — ABone Control Daemon Server for remote EE management On-demand EE initiation and termination Automatic EE restart.
Java GUI building approaches Aleksandar Kartelj Faculty of Mathematics, Belgrade 11 th Workshop “Software Engineering Education and.
Thanks to Edoardo Martelli, Stefan Stancu and Adam Krajewski
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
MARVELORIGINS CS 235 Data Visualization Project 12/17/2014 Jarad Bell Ryan LaCross Stella Lee Karan Khare.
User Profiling using Semantic Web Group members: Ashwin Somaiah Asha Stephen Charlie Sudharshan Reddy.
Senior Project – Computer Science – 2015 Effect of Display Size on a Player’s Situational Awareness in Real-Time Strategy Games Peter Miralles Advisor.
National Center for Atmospheric Research Pittsburgh Supercomputing Center National Center for Supercomputing Applications Web100 Roll Out I2 Members Meeting.
FirewallPK Security tool for centralized Access Control List Management th RoEduNet International Conference - Networking in Education and Research.
Introduction 1 Lars Vogel 4/22/2009.  Who am I?  Eclipse as a platform  What is Eclipse RCP?  Extension Points / Extensions  Equinox  SWT & JFace.
Networks are connections and interactions. Networks are present in every aspect of life. Examples include economics/social/political sciences. Networks.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ECLIPSE RICH CLIENT PLATFORM Part 1 Introduction.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
Enterprise Library Overview
Understand Networking Services
Visualizing Real-Time Network Resource Usage
STM Annual Spring Conference 2011
Unified Modeling Language
The Globus Toolkit™: Information Services
ModelNet: A Large-Scale Network Emulator for Wireless Networks Priya Mahadevan, Ken Yocum, and Amin Vahdat Duke University, Goal:
Resources and Schedule
Presentation transcript:

Visualizing Real-Time Network Resource Usage Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, and Aaron Schulman University of Maryland, Dept. of Computer Science Contact: Workshop on Visualization for Computer Security September 15, 2008Boston, MA

Introduction Computer network data is rich, and full of interesting patterns – Adversarial behavior – Configuration problems – Unfair resource usage Network administrators don’t typically use visualization tools – Too much data to see visually – Cluttered – Hard to follow – Primary tools are text based NetGrok brings new visualizations to network administrators

Goals Real-time Visual stability Identify local systems Monitor behavior – Attacks – Topology changes – Unusual network usage

NetGrok

Contributions Hashed layout for consistent node placement Grouped, home-centric network layout Treemap showing connections between nodes without occlusion Mouse-over and preferential display of edges reduces visual complexity Application of filter and selection widgets to network visualization Visualization framework for real-time IP data flows

Implementation Details Built in Java Visualizations and data store built primarily using the Prefuse toolkit, – Custom data structures and visualizations Packet capturing and PCAP file reading use the JPCAP library GUI constructed with Jigloo Eclipse plugin

Professional Feedback Expert user: Brad Plecs, Network Administrator for the CS Dept. at UMD Use case meetings (2 x 1 hr + s) PCAP and live capture analysis (1 hr) Likert scale questionnaire Positive: – Filter sliders, esp. time histogram – Intuitive layout and grouping – "NetGrok is excellent as a real-time diagnostic" Criticisms: – Needs to be aware of transport layer data (TCP/UDP) – Dynamic grouping – Animations are confusing, distracting, and slow – Treemaps interesting but not intuitive

Future Work Add support for aging off old data Add more visualizations – Semantic substrates for foreign host layout – Coarser views for larger data sets Personal security tool

Acknowledgments Professor Ben Shneiderman our advisor Brad Plecs for offering expert advice and participation in our preliminary case study Thomas Lotze, Joonghoon Lee, Michael VanDaniker, Fatemeh Mir Rashed, Abigail Daken, Michael Lam, Huimin Guo, and Krist Wongsuphasawat our class paper reviewers

Contact Info Website: