Skip to main content

An IDS Visualization System for Anomalous Warning Events

  • Conference paper
Computer and Information Science

Part of the book series: Studies in Computational Intelligence ((SCI,volume 493))

  • 1139 Accesses

Abstract

Recently, illegal access to the network is increasing. It has been a serious problem. To deal with this problem, necessity of Intrusion Detection System(IDS) is increasing. IDS is the notifying system of network manager to inspect symptoms of the illegal access. IDS enables us to early detect threatening attack to the computers and to deal with its attacks. However there is a problem of IDS. It is tremendous warning logs especially for large scale network. Analyzing these logs apply a large amount of load to a network manager. To overcome this problem, there exist several methods for analyzing logs based on past tendency and some visualization methods for the logs. In this paper, we propose a novel visualization system of IDS considering order relation of IP addresses that emphasize the anomalous warning events based on past tendency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Toda, T., Inaba, H.: A Study on Log Analysis Based on Tendency of IDS Alert Event. IEICE Technical Report, SITE2010-7, pp. 7–12 (2010) (in Japan)

    Google Scholar 

  2. Takemori, K., Miyake, Y., Tanaka, T., Sasase, I.: Modeling Techniques about Statistical Theory of Attack Events. Technical Report of IEICE 103(691), 20–27 (2004) (in Japan)

    Google Scholar 

  3. Takemori, K., Miyake, Y., Nakao, K., Sugaya, F., Sasase, I.: A Support System for Analyzing IDS Log Applied to Security Operation Center. IEICE Trans. A J87-A(6), 816–825 (2004) (in Japan)

    Google Scholar 

  4. Li, L., Inaba, H., Wakasugi, K.: Notes on 2D Visualization Method for IDS that can Distinguish Individual Warning Event. IIEEJ Journal 40(2), 369–376 (2011) (in Japan)

    Google Scholar 

  5. Itoh, T., Takakura, H., Koyamada, K.: Hierarchical visualization of network intrusion detection data. IEEE Computer Graphics Applications 26(2), 40–47 (2006)

    Article  Google Scholar 

  6. I.R.V.I. Alarms: IDS RainStorm: Visualizing IDS Alarms, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.117.8777&rep=rep1&type=pdf

  7. Mizoguchi, S., Inaba, H.: Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses. IEICE Technical Report 111(125), 19–24 (2011) (in Japan)

    Google Scholar 

  8. ”Snort”, http://www.snort.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satoshi Kimura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Kimura, S., Inaba, H. (2013). An IDS Visualization System for Anomalous Warning Events. In: Lee, R. (eds) Computer and Information Science. Studies in Computational Intelligence, vol 493. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-00804-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-00804-2_6

  • Publisher Name: Springer, Heidelberg

  • Print ISBN: 978-3-319-00803-5

  • Online ISBN: 978-3-319-00804-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics