Full Content is available to subscribers

Subscribe/Learn More  >
Proceedings Article

On detection and visualization techniques for cyber security situation awareness

[+] Author Affiliations
Wei Yu, Shixiao Wei, Hanlin Zhang, Chao Lu

Towson Univ. (United States)

Dan Shen, Genshe Chen

Intelligent Fusion Technology, Inc. (United States)

Misty Blowers, Erik P. Blasch, Khanh D. Pham

Air Force Research Lab. (United States)

Proc. SPIE 8739, Sensors and Systems for Space Applications VI, 87390R (May 21, 2013); doi:10.1117/12.2015887
Text Size: A A A
From Conference Volume 8739

  • Sensors and Systems for Space Applications VI
  • Khanh D. Pham; Joseph L. Cox; Richard T. Howard; Genshe Chen
  • Baltimore, Maryland, USA | April 29, 2013

abstract

Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system. © (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Citation

Wei Yu ; Shixiao Wei ; Dan Shen ; Misty Blowers ; Erik P. Blasch, et al.
" On detection and visualization techniques for cyber security situation awareness ", Proc. SPIE 8739, Sensors and Systems for Space Applications VI, 87390R (May 21, 2013); doi:10.1117/12.2015887; http://dx.doi.org/10.1117/12.2015887


Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).

Figures

Tables

NOTE:
Citing articles are presented as examples only. In non-demo SCM6 implementation, integration with CrossRef’s "Cited By" API will populate this tab (http://www.crossref.org/citedby.html).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement


  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.