Abstract
Snort is a rule-based intrusion detection system, applying defined rules to inspect suspicious packets in network. An alert will be generated if an alert rule is triggered. Analysis of the relation between rules and alerts can help network administrators to analyze alerts easily so as to identify network attacks. The aim of this work is to develop a visualization tool that can be used to view the rules and alerts in visualization. The proposed visualization tool, which is called VisSRA, also can be used to find the relation between rules and alerts, view the number of alerts triggered by a rule and check the alerts quickly. Tree maps were used to visualize rules Snort contains and alerts Snort generates which are shown as cells with different colors. The system uses the graphical and statistical manners to allow even novices to get an overview of network state. In this paper, an experiment was given to show the proposed approach could bring some convenience of browsing and analyzing network anomalies to administrators.
Original language | English |
---|---|
Pages | 441-444 |
Number of pages | 4 |
DOIs | |
Publication status | Published - 2012 |
Event | 4th International Conference on Computational Intelligence and Communication Networks, CICN 2012 - Mathura, Uttar Pradesh, India Duration: 3 Nov 2012 → 5 Nov 2012 |
Conference
Conference | 4th International Conference on Computational Intelligence and Communication Networks, CICN 2012 |
---|---|
Country/Territory | India |
City | Mathura, Uttar Pradesh |
Period | 3/11/12 → 5/11/12 |
Keywords
- Snort
- alert
- rule
- treemap