A dynamic three-dimensional network visualization program for integration into cyberciege and other network visualization scenarios

Download
Author
Sledz, Daniel A.
Coomes, Donald E.
Date
2007-06Advisor
Kölsch, Mathias
Second Reader
Thompson, Michael
Metadata
Show full item recordAbstract
Detailed information and intellectual understanding of a network's topology and vulnerabilities is invaluable to better securing computer networks. Network protocol analyzers and intrusion detection systems can provide this additional information. In particular, game-based trainers, such as CyberCIEGE, have been shown to improve the level of training and understanding of network security professionals. This thesis' objective is to enhance these applications by developing NTAV3D, or, Network Topology and Attack Visualizer (Three Dimensional). NTAV3D is a tool that displays network topology, vulnerabilities, and attacks in an interactive, three dimensional environment. This augments the design and gameplay of CyberCIEGE by increasing gameplayer interaction and data display. Additionally, NTAV3D can be expanded to provide this capability to network analysis and intrusion detection tools. Furthermore, NTAV3D expands on ideas and results from related work of the best ways to visualize network topology, vulnerabilities, and attacks. NTAV3D was created using open-source software technologies including Xj3D, X3D, Java, and XML. It is also one of the first applications to be built with only the Xj3D toolkit. Therefore, the development process allowed evaluation of these technologies, resulting in recommendations for future improvements.
Collections
Related items
Showing items related by title, author, creator and subject.
-
A Technique for Presenting a Deceptive Dynamic Network Topology
Trassare, Samuel T. (Monterey, California: Naval Postgraduate School, 2013-03);Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe ... -
A Technique for Network Topology Deception
Trassare, Samuel; Beverly, Robert; Alderson, David (2013);Civilian and military networks are continually probed for vulnerabilities. Cyber criminals, and autonomous botnets under their control, regularly scan networks in search of vulnerable systems to co-opt. Military and more ... -
Security planning for wireless networks : DoD concerns
Fowler, James D. (Monterey, California. Naval Postgraduate School, 1997-09);Wireless networking is a rapidly emerging technology and security must be addressed as it is incorporated into new and existing local area networks (LANs). It is important to know what unique properties of wireless LANs ...