A NOVEL NETWORK ANALYZING TOOL (NNAT) FOR COMPLEX NETWORK INFORMATION VISUALIZATION
Abstract
Analyzing and monitoring networks can be difficult, especially when large volumes of packets fly back and forth between devices. Therefore, visual network analysis provides a solution by allowing users to visualize and interpret complex network data more intuitively and interactively. Traditional tools have limited visualization capabilities and mostly represent data in a tabular format that is difficult to analyze and time-consuming for the users. In this paper, a novel network analyzing tool (NNAT) is proposed to integrate packet sniffing, visual analysis of packets, and live network scanning within the same tool. Also, presenting the analyzed data via different interfaces with the capability of filtering specific information. The function variety of the proposed tool reduces the number of tools to be used by network admins. Also, the flexibility of the proposed tool in the data visualization and presentation with proper diagrams and drawings makes it to be user-friendly, in additional to its inherent outperformance explore and analyze large datasets compared to traditional tools.
Downloads
References
P. Godfrey, J. Gryz, and P. Lasek, “Interactive Visualization of Large Data Sets,” IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 8, pp. 2142–2157, Aug. 2016, doi: https://doi.org/10.1109/tkde.2016.2557324.
Wireshark Foundation, “Wireshark,” Wireshark.org, 2016. https://www.wireshark.org/
V. T. Guimaraes, C. M. D. S. Freitas, R. Sadre, L. M. R. Tarouco, and L. Z. Granville, “A Survey on Information Visualization for Network and Service Management,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 285–323, 2016, doi: https://doi.org/10.1109/comst.2015.2450538.
S. Cirillo, D. Desiato, and B. Breve, “CHRAVAT - Chronology Awareness Visual Analytic Tool,” IEEE Xplore, Jul. 01, 2019. https://ieeexplore.ieee.org/abstract/document/8811994
S. Chen, C. Guo, X. Yuan, F. Merkle, H. Schaefer, and T. Ertl, “OCEANS,” Proceedings of the Eleventh Workshop on Visualization for Cyber Security, Nov. 2014, doi: https://doi.org/10.1145/2671491.2671493.
“Online PCAP file analyzer designed to visualize HTTP, Telnet, FTP,” A-Packets. https://apackets.com/
“DynamiteLab,” lab.dynamite.ai. https://lab.dynamite.ai/ (accessed Jul. 07, 2023).
A. Attipoe, J. Yan, C. Turner, and D. Richards, “Visualization Tools for Network Security,” Electronic Imaging, vol. 2016, no. 1, pp. 1–8, Feb. 2016, doi: https://doi.org/10.2352/issn.2470-1173.2016.1.vda-489.
J. Uhlár, M. Holkovič, and V. Rusňák, “PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files,” IEEE Xplore, Jul. 01, 2021. https://ieeexplore.ieee.org/abstract/document/9582696/metrics#metrics
A. Ulmer, D. Sessler, and J. Kohlhammer, “NetCapVis: Web-based Progressive Visual Analytics for Network Packet Captures,” IEEE Xplore, Oct. 01, 2019. https://ieeexplore.ieee.org/abstract/document/9161633
F. Böhm, Ludwig Englbrecht, S. Friedl, and Günther Pernul, “Visual Decision-Support for Live Digital Forensics,” Oct. 2021, doi: https://doi.org/10.1109/vizsec53666.2021.00012.
J. Biswas and A. Ashutosh, “An Insight into Network Traffic Analysis using Packet Sniffer,” International Journal of Computer Applications, vol. 94, no. 11, pp. 39–44, May 2014, doi: https://doi.org/10.5120/16391-5975.
Meta Open Source, “React,” react.dev, 2023. https://react.dev/
“Chart.js | Open source HTML5 Charts for your website,” Chartjs.org, 2019. https://www.chartjs.org/
Flask, “Welcome to Flask — Flask Documentation (2.3.x),” flask.palletsprojects.com. https://flask.palletsprojects.com/en/2.3.x/
It is the policy of the Journal of Duhok University to own the copyright of the technical contributions. It publishes and facilitates the appropriate re-utilize of the published materials by others. Photocopying is permitted with credit and referring to the source for individuals use.
Copyright © 2017. All Rights Reserved.