Visual analytics with decision tree on network traffic flow for botnet detection
Visual analytics (VA) is an integral approach combining visualization, human factors, and data analysis. VA can synthesize information and derive insight from massive, dynamic, ambiguous and often conflicting data. Thus, help discover the expected and unexpected information. Moreover, the visualizat...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Center for Scientific Research and Studies
2018
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/86502/1/MuhammadKhairulRijal2018_VisualAnalyticswithDecisionTreeonNetwork.pdf http://eprints.utm.my/id/eprint/86502/ http://home.ijasca.com/data/documents/4_Pg_72-91_Visual-Analytics-with-Decision-Tree-on-Network-Traffic-Flow-for-Botnet-Detection.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Visual analytics (VA) is an integral approach combining visualization, human factors, and data analysis. VA can synthesize information and derive insight from massive, dynamic, ambiguous and often conflicting data. Thus, help discover the expected and unexpected information. Moreover, the visualization could support the assessment in a timely period on which pre-emptive action can be taken. This paper discusses the implementation of visual analytics with decision tree model on network traffic flow for botnet detection. The discussion covers scenarios based on workstation, network traffic ranges and times. The experiment consists of data modeling, analytics and visualization using Microsoft PowerBI platform. Five different VA with different scenario for botnet detection is examined and analysis. From the studies, it may provide visual analytics as flexible approach for botnet detection on network traffic flow by being able to add more information related to botnet, increase path for data exploration and increase the effectiveness of analytics tool. Moreover, learning the pattern of communication and identified which is a normal behavior and abnormal behavior will be vital for security visual analyst as a future reference. |
---|