期刊文献+

大规模网络安全事件预警可视化算法研究 被引量:1

Study on visualization algorithm in large-scale network security precaution
下载PDF
导出
摘要 安全事件的可视化是大规模网络安全宏观预警的重要组成部分。根据大规模网络拓扑的结构特点,结合空间信息可视化领域中H3算法,提出了对大规模网络安全事件的宏观分布特征和局部细节进行空间可视化的处理办法。最后有效应用于教育网网络安全数据的宏观显示,实验证明为网络管理员提供了直观的显示效果并为其了解网络安全事件整体态势和从全局角度制定行之有效的控制策略提供了有力依据。 Visualization of security events is an important component of large-scale network security warning.The research includes combining structural characteristic of large-scale network topology with the H3 algorithm in the field of information visualization,providing methods for visualizing the overall distribution and local details of large-scale network security events,and applying it effectively to the visualization of network security data on CERNET.Experiment results show that the methods present a sound visual effect to the network administrator to help him/her grasp the global security situation,and then work out an effective control plan in an overall perspective.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第21期115-117,167,共4页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)(the National High-Tech Research and Development Plan of China under Grant No.2002AA142020) 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60203021)。
关键词 入侵检测 大规模网络安全预警 安全事件 可视化 H3算法 intrusion detection large-scale network security warning security events visualization H3 algorithm
  • 相关文献

参考文献2

二级参考文献29

  • 1[1]Paxson V. End-to-End routing behavior in the Internet. IEEE/ACM Transactions on Networking, 1997,5(5):601~615.
  • 2[2]Kalidindi S, Zekauskas MJ. Surveyor: an infrastructure for Internet performance measurements. In: Proceedings of the INET'99. San Jose, 1999. http://www.isoc.org/inet99/proceedings/4h/4h_2.htm.
  • 3[3]Claffy K, Monk TE, McRobb D. Internet tomography. Nature, 1999, January 7. http://www.nature.com/nature/webmatters/tomog/ tomog.html.
  • 4[4]Burch H, Cheswick B. Mapping the Internet. IEEE Computer, 1999,32(4):97~98.
  • 5[5]Wolski R, Spring N, Hayes J. The network weather service: a distributed resource performance forecasting service for metacomputing. Journal of Future Generation Computing Systems, 1999,15(5):757~768.
  • 6[6]Chang H, Jamin S, Willinger W. Inferring AS-level Internet topology from router-level path traces. In: Proceedings of the SPIE ITCom 2001. 2001. http://citeseer.nj.nec.com/chang01inferring.html.
  • 7[7]Govindan R, Tangmunarunkit H. Heuristics for Internet map discovery. In: Proceedings of the IEEE INFOCOM 2000, Vol 3. 2000. 1371~1380. http://citeseer.nj.nec.com/govindan00heuristics.html.
  • 8[8]Munzner T. Interactive visualization of large graphs and networks [Ph.D. Thesis]. Stanford University, 2000.
  • 9[9]Tauro SL, Palmer C, Siganos G, Faloutsos M. A simple conceptual model for the Internet topology. In: Proceedings of the IEEE Conference of Global Telecommunications. 2001. http://www.cs.ucr.edu/~michalis/PAPERS/jellyfish-GI.pdf.
  • 10Internet domain survey [EB/OL]. http://www.isc.org/ds/, December 2001.

共引文献129

同被引文献9

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部