Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGray, Cameron C.-
dc.contributor.authorRitsos, Panagiotis D.-
dc.contributor.authorRoberts, Jonathan C.-
dc.description.abstractOne of the goals of network administrators is to identify and block sources of attacks from a network steam. Various tools have been developed to help the administrator identify the IP or subnet to be blocked, however these tend to be non-visual. Having a good perception of the wider network can aid the administrator identify their origin, but while network maps of the Internet can be useful for such endeavors, they are difficult to construct, comprehend and even utilize in an attack, and are often referred to as being “hairballs”. We present a visualization technique that displays pathways back to the attacker; we include all potential routing paths with a best-efforts identification of the commercial relationships involved. These two techniques can potentially highlight common pathways and/or networks to allow faster, more complete resolution to the incident, as well as fragile or incomplete routing pathways to/from a network. They can help administrators re-profile their choice of IP transit suppliers to better serve a target audience.en_GB
dc.subjectNetwork Visualizationen_GB
dc.subjectInternet Routingen_GB
dc.titleContextual Network Navigation; Situational Awareness for Network Administratorsen_GB
Appears in Collections:Accepted Papers

Files in This Item:
File Description SizeFormat 
VizSec_Network_Path_Mapping.pdfMain Paper836.62 kBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.