VAST 2012 mini-challenge 2: Chart- and matrix-based approach to network operations forensics

Jan Hildenbrand, Daniel Ionut Paval, Prakash Thapa, Christian Rohrdantz, Florian Mansmann, Enrico Bertini, Tobias Schreck

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    We report the approach and results on the VAST 2012 MiniChallenge 2: Bank of Money Regional Office Network Operations Forensics. Using commercial data mining, visualization and database software such as KNIME, Tableau and MySQL as well as a custom-written source vs. destination IP pixel matrix, our team of students identified suspicious IRC traffic, an attack on the firewall, a drop in the firewall connections, an attempt for sensitive information exchange and a possible Distributed Denial-of-Service attack executed partly from a host within the bank network.

    Original languageEnglish (US)
    Title of host publicationIEEE Conference on Visual Analytics Science and Technology 2012, VAST 2012 - Proceedings
    Pages287-288
    Number of pages2
    DOIs
    StatePublished - 2012
    Event2012 IEEE Conference on Visual Analytics Science and Technology, VAST 2012 - Seattle, WA, United States
    Duration: Oct 14 2012Oct 19 2012

    Publication series

    NameIEEE Conference on Visual Analytics Science and Technology 2012, VAST 2012 - Proceedings

    Other

    Other2012 IEEE Conference on Visual Analytics Science and Technology, VAST 2012
    Country/TerritoryUnited States
    CitySeattle, WA
    Period10/14/1210/19/12

    ASJC Scopus subject areas

    • Computer Science Applications
    • Computer Vision and Pattern Recognition

    Fingerprint

    Dive into the research topics of 'VAST 2012 mini-challenge 2: Chart- and matrix-based approach to network operations forensics'. Together they form a unique fingerprint.

    Cite this