Figure 7: Visualization of a downed host.
5 CONCLUSIONS
We have presented a novel pipeline to network data
analysis that enables to visually monitor industrial
networks by using whitelists and chord diagrams. To
do so, first we build a time-based industrial traffic
model which whitelists allowed network flows. More-
over, the model considers packet throughput, in addi-
tion to host addresses, server ports and IP protocols
that makes possible to detect additional flow-related
anomalies (DoS attacks and downed hosts). Each
entry of the model whitelists an specific duration of
gathered flow data. In the same way, every new flow
data is compared against the traffic model to see if
it fits an entry. All flows are tagged according to its
nature (legitimate, anomalous, incorrect port or pro-
tocol, missing and anomalous flow size).
This tagged data is used to build chord diagrams
that represent network flow relationships between dif-
ferent hosts. The size of the chords represents the
amount of network packets in the flow, used as the
main metric to build the diagram. The tagging system
provides a color code to highlight anomalous flows
(in red and black) and also provides feedback about
its nature.
REFERENCES
Barbosa, R. R. R., Sadre, R., and Pras, A. (2013).
Flow Whitelisting in SCADA Networks. Interna-
tional Journal of Critical Infrastructure Protection,
6(3):150–158.
Bostock, M., Ogievetsky, V., and Heer, J. (2011). D
3
data-driven documents. Visualization and Computer
Graphics, IEEE Transactions on, 17(12):2301–2309.
C
´
ardenas, A., Amin, S., and Sastry, S. (2008). Research
Challenges for the Security of Control Systems. In
HotSec.
Cheminod, M., Durante, L., and Valenzano, A. (2013). Re-
view of Security Issues in Industrial Networks. IEEE
Transactions on Industrial Informatics, 9(1):277–293.
Chen, S., Guo, C., Yuan, X., Merkle, F., Schaefer, H., and
Ertl, T. (2014). OCEANS: online collaborative explo-
rative analysis on network security. In Proceedings
of the Eleventh Workshop on Visualization for Cyber
Security, pages 1–8. ACM.
Duggan, D., Berg, M., Dillinger, J., and Stamp, J.
(2005). Penetration testing of industrial control sys-
tems. Technical Report SAND2005-2846P, Sandia
National Laboratories.
Falliere, N., Murchu, L. O., and Chien, E. (2011).
W32.Stuxnet dossier. White paper, Symantec Corp.,
Security Response.
Galloway, B. and Hancke, G. (2012). Introduction to Indus-
trial Control Networks. IEEE Communications Sur-
veys & Tutorials, 15(2):860–880.
Hentunen, D. and Tikkanen, A. (2014). Havex Hunts
For ICS/SCADA Systems. [Online]. Avail-
able: http://www.f-secure.com/weblog/archives/
00002718.html (Retrieved: 2015-11-19).
Krzywinski, M., Schein, J., Birol, I., Connors, J., Gas-
coyne, R., Horsman, D., Jones, S. J., and Marra, M. A.
(2009). Circos: an information aesthetic for compara-
tive genomics. Genome Research, 19(9):1639–1645.
Layton, R., Watters, P., and Dazeley, R. (2012). Unsu-
pervised authorship analysis of phishing webpages.
In Communications and Information Technologies
(ISCIT), 2012 International Symposium on, pages
1104–1109. IEEE.
Mazel, J., Fontugne, R., and Fukuda, K. (2014). Visual
comparison of network anomaly detectors with chord
diagrams. In Proceedings of the 29th Annual ACM
Symposium on Applied Computing, pages 473–480.
ACM.
McAfee (2011). Global Energy Cyberattacks: “Night
Dragon” (white paper). Technical report, McAfee.
Miller, B. and Rowe, D. (2012). A survey of SCADA and
Critical Infrastructure incidents. In Proceedings of
the 1st Annual conference on Research in information
technology, pages 51–56. ACM.
Norwegian Oil and Gas Association (2009). 104 - Recom-
mended guidelines for information security baseline
requirements for process control, safety and support
ICT systems.
Stouffer, K., Falco, J., and Scarfone, K. (2011). Guide to In-
dustrial Control Systems (ICS) Security, Special pub-
lication 800-82. Technical report, National Institute of
Standards and Technology.
Tack, T., Maier, A., and Niggemann, O. (2014). On Visual
Analytics in Plant Monitoring. In Informatics in Con-
trol, Automation and Robotics, pages 19–33. Springer.
Zeng, W., Fu, C.-W., Arisona, S. M., and Qu, H. (2013). Vi-
sualizing interchange patterns in massive movement
data. In Eurographics Conference on Visualization
(EuroVis), volume 32, pages 271–280.
IVAPP 2016 - International Conference on Information Visualization Theory and Applications
108