Dagstuhl Seminar Proceedings, Volume 9211



Publication Details

  • published at: 2009-09-30
  • Publisher: Schloss Dagstuhl – Leibniz-Zentrum für Informatik

Access Numbers

Documents

No documents found matching your filter selection.
Document
09211 Abstracts Collection – Visualization and Monitoring of Network Traffic

Authors: Daniel A. Keim, Aiko Pras, Jürgen Schönwälder, and Pak Chung Wong


Abstract
From 17.05. to 20.05.2009, the Dagstuhl Seminar 09211 ``Visualization and Monitoring of Network Traffic '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

Cite as

Daniel A. Keim, Aiko Pras, Jürgen Schönwälder, and Pak Chung Wong. 09211 Abstracts Collection – Visualization and Monitoring of Network Traffic. In Visualization and Monitoring of Network Traffic. Dagstuhl Seminar Proceedings, Volume 9211, pp. 1-8, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)


Copy BibTex To Clipboard

@InProceedings{keim_et_al:DagSemProc.09211.1,
  author =	{Keim, Daniel A. and Pras, Aiko and Sch\"{o}nw\"{a}lder, J\"{u}rgen and Wong, Pak Chung},
  title =	{{09211 Abstracts Collection – Visualization and Monitoring of Network Traffic }},
  booktitle =	{Visualization and Monitoring of Network Traffic},
  pages =	{1--8},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2009},
  volume =	{9211},
  editor =	{Daniel A. Keim and Aiko Pras and J\"{u}rgen Sch\"{o}nw\"{a}lder and Pak Chung Wong},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09211.1},
  URN =		{urn:nbn:de:0030-drops-21586},
  doi =		{10.4230/DagSemProc.09211.1},
  annote =	{Keywords: Computer Networks, Internet, Monitoring of Networks and Services, Visualization Animation}
}
Document
09211 Executive Summary – Visualization and Monitoring of Network Traffic

Authors: Daniel A. Keim, Aiko Pras, Jürgen Schönwälder, Pak Chung Wong, and Florian Mansmann


Abstract
The seamless operation of the Internet requires being able to monitor and visualize the actual behaviour of the network. Today, IP network operators usually collect network flow statistics from critical points of their network infrastructure. Flows aggregate packets that share common properties. Flow records are stored and analyzed to extract accounting information and increasingly to identify and isolate network problems or security incidents. While network problems or attacks significantly changing traffic patterns are relatively easy to identify, it tends to be much more challenging to identify creeping changes or attacks and faults that manifest themselves only by very careful analysis of initially seemingly unrelated traffic pattern and their changes. There are currently no deployable good solutions and research in this area is just starting. In addition, the large volume of flow data on high capacity networks and exchange points requires to move to probabilistic sampling techniques, which require new analysis techniques to calculate and also visualize the uncertainty attached to data sets.

Cite as

Daniel A. Keim, Aiko Pras, Jürgen Schönwälder, Pak Chung Wong, and Florian Mansmann. 09211 Executive Summary – Visualization and Monitoring of Network Traffic. In Visualization and Monitoring of Network Traffic. Dagstuhl Seminar Proceedings, Volume 9211, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)


Copy BibTex To Clipboard

@InProceedings{keim_et_al:DagSemProc.09211.2,
  author =	{Keim, Daniel A. and Pras, Aiko and Sch\"{o}nw\"{a}lder, J\"{u}rgen and Wong, Pak Chung and Mansmann, Florian},
  title =	{{09211 Executive Summary – Visualization and Monitoring of Network Traffic}},
  booktitle =	{Visualization and Monitoring of Network Traffic},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2009},
  volume =	{9211},
  editor =	{Daniel A. Keim and Aiko Pras and J\"{u}rgen Sch\"{o}nw\"{a}lder and Pak Chung Wong},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09211.2},
  URN =		{urn:nbn:de:0030-drops-21574},
  doi =		{10.4230/DagSemProc.09211.2},
  annote =	{Keywords: Computer Networks, Internet, Monitoring of Networks and Services, Visualization Animation}
}
Document
Accounting system for heterogeneous IP-networks (IPNA) implemented at Kaiserslautern University

Authors: Brian Worden, Claudia Baltes, Inga Scheler, Paul Müller, and Hans Hagen


Abstract
This paper describes an accounting system (IPNA) for heterogenous IP-networks with arbitrary topologies implemented at the university of Kaiserslautern. The produced data volume per unit is numerated. The collected data is stored in a database and offers different analysis possibilities. The results can be visualized and adapted to the users requirements. The main effort was to build a data traffic quota system for single units as well as groups of devices that also report exceeded quotas. The system itself only observes the network traffic. Interfaces offer tools to interact with the network. The IPNA consists of a back-end for the data- acquisition and -preparation and a front-end for configuration and visualization tasks including quality control.

Cite as

Brian Worden, Claudia Baltes, Inga Scheler, Paul Müller, and Hans Hagen. Accounting system for heterogeneous IP-networks (IPNA) implemented at Kaiserslautern University. In Visualization and Monitoring of Network Traffic. Dagstuhl Seminar Proceedings, Volume 9211, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)


Copy BibTex To Clipboard

@InProceedings{worden_et_al:DagSemProc.09211.3,
  author =	{Worden, Brian and Baltes, Claudia and Scheler, Inga and M\"{u}ller, Paul and Hagen, Hans},
  title =	{{Accounting system for heterogeneous IP-networks (IPNA) implemented at Kaiserslautern University}},
  booktitle =	{Visualization and Monitoring of Network Traffic},
  pages =	{1--7},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2009},
  volume =	{9211},
  editor =	{Daniel A. Keim and Aiko Pras and J\"{u}rgen Sch\"{o}nw\"{a}lder and Pak Chung Wong},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09211.3},
  URN =		{urn:nbn:de:0030-drops-21557},
  doi =		{10.4230/DagSemProc.09211.3},
  annote =	{Keywords: Accounting system, IP-network, Communication, informa- tion visualization, online quality control}
}
Document
Comparison of Node-Link and Hierarchical Edge Bundling Layouts: A User Study

Authors: Alexandru Telea, Ozan Ersoy, Hessel Hoogendorp, and Dennie Reniers


Abstract
Visually investigating large network-like structures is a challenging task. Several approaches have been proposed in the past: node-link diagrams, adjacency matrices, and, more recently, hierarchical edge bundles. We present a recent experiment that compares the effectiveness of the classical node-link diagrams with the more recent hierarchical bundled edges. The users involved several computer science practitioners, the data ranged from graphs of several hundreds to several tens of hundreds of nodes, the tasks involved answering a number of structural overview as well as detailed questions involved system dependencies.

Cite as

Alexandru Telea, Ozan Ersoy, Hessel Hoogendorp, and Dennie Reniers. Comparison of Node-Link and Hierarchical Edge Bundling Layouts: A User Study. In Visualization and Monitoring of Network Traffic. Dagstuhl Seminar Proceedings, Volume 9211, pp. 1-12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)


Copy BibTex To Clipboard

@InProceedings{telea_et_al:DagSemProc.09211.4,
  author =	{Telea, Alexandru and Ersoy, Ozan and Hoogendorp, Hessel and Reniers, Dennie},
  title =	{{Comparison of Node-Link and Hierarchical Edge Bundling Layouts: A User Study}},
  booktitle =	{Visualization and Monitoring of Network Traffic},
  pages =	{1--12},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2009},
  volume =	{9211},
  editor =	{Daniel A. Keim and Aiko Pras and J\"{u}rgen Sch\"{o}nw\"{a}lder and Pak Chung Wong},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09211.4},
  URN =		{urn:nbn:de:0030-drops-21542},
  doi =		{10.4230/DagSemProc.09211.4},
  annote =	{Keywords: Graph visualization, user studies, software visualization, call graphs}
}
Document
Interactive Exploration of the Network Behavior of Personal Machines

Authors: Mike Sips, Sascha Simon, and John Gerth


Abstract
Personal machines are often the weakest points within a large network. Although they run an ever-increasing number of network services, these machines are often controlled by users who are unaware of security threats. Thus, a well-informed attacker can, with modest effort, identify and gain control over personal machines. However, system administrators need to know the tools and techniques used for attacks while simultaneously needing to invest huge analytical efforts to detect malicious behavior in the vast volumes of network traffic. In our research project we investigate the idea that an understanding of the regular behavior of personal machines can improve the chance of detecting the point in time when a machine shows malicious behavior. We propose a visual exploration system based on a data abstraction layer and temporal visual representations of the network traffic. The data abstraction layer enables an interactive change in the level of detail of the network traffic while temporal visualizations help system administrators to detect unexpected network traffic. In the next phase of this project, we will conduct experiments to get a good feel about the limits of our system in detecting malicious behavior in real-world scenarios.

Cite as

Mike Sips, Sascha Simon, and John Gerth. Interactive Exploration of the Network Behavior of Personal Machines. In Visualization and Monitoring of Network Traffic. Dagstuhl Seminar Proceedings, Volume 9211, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)


Copy BibTex To Clipboard

@InProceedings{sips_et_al:DagSemProc.09211.5,
  author =	{Sips, Mike and Simon, Sascha and Gerth, John},
  title =	{{Interactive Exploration of the Network Behavior of Personal Machines}},
  booktitle =	{Visualization and Monitoring of Network Traffic},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2009},
  volume =	{9211},
  editor =	{Daniel A. Keim and Aiko Pras and J\"{u}rgen Sch\"{o}nw\"{a}lder and Pak Chung Wong},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09211.5},
  URN =		{urn:nbn:de:0030-drops-21565},
  doi =		{10.4230/DagSemProc.09211.5},
  annote =	{Keywords: Visualization, Communication Patterns, Data Abstraction, Personal Machines}
}

Filters


Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail