Examine and Visualising Packet Capture Files
S. Leelalakshmi1, K. Tamilselvi2, K. Ramesh Kumar3

1S. Leelalakshmi, Research Scholar, Bharathiar University, Coimbatore (Tamil Nadu), India.
2K. Tamilselvi, Research Scholar, Bharathiar University, Coimbatore (Tamil Nadu), India.
3K. Ramesh Kumar, Research Guide, Bharathiar University, Coimbatore (Tamil Nadu), India.
Manuscript received on 20 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 02 November 2019 | PP: 3930-3933 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B15310982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1531.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The field of security Visualisation is an interesting and tough field of research. Enormous amount of (big) data is involved in the networking of devices. In order to analyse and get data for solving the problem, visualisation can be very helpful. Combination of security world as well as the network world is discussed in this paper. Identifying various visualisation techniques for security log data and executing workflow based composition of multiple analytic components will be identified. Interactive modes of the techniques will be discussed. Making the security files to be readable and the format for analysing are identified. More network visualisation tool allows the security analysts to quickly examine the large amount of information by rendering a millions of events and log entries in a single graphical view. Extracting files from full packet captures can save security analyst a great deal of time. There are tools available for capturing PCAP(Packet Capture) files. This PCAP files will be analysed for further details. In the proposed solution, the PCAP files will be generated with the help of Wireshark and it will be processed with the help of Apache drill for converting it into a readable format and the Visualisation can be done with R Studio. Various Visualisation tools in R will be used to visualise the PCAP files. This in order will thoroughly give some insight on the log files for any detection and prediction of malicious data.
Keywords: PCAP, Security Visualisation, Analytic Components, Visualisation Tools.
Scope of the Article: Security, Trust and Privacy