期刊文献+

信息熵时序和树图用于NetFlow可视化的研究

Research on applying information entropy time series and TreeMap to NetFlow visualization
下载PDF
导出
摘要 针对NetFlow日志规模日益扩大、变化日益加快,致使管理和分析难度日益增大的趋势,根据网络安全可视化的思想,构建了一种用时间序列(Time series)图和树图(TreeMap)相结合的方式分析NetFlow日志的可视化系统(简称2T图系统),用以快速、有效地识别网络中的攻击和异常事件,掌握网络安全态势。该系统重点考虑了NetFlow日志中六个特征维的信息熵,通过构建时间序列图来从宏观上掌控网络状态,同时引入树图来深度挖掘入侵细节。系统还通过创建图像特征规则,从图像上直观分析攻击,发现感兴趣的模式。通过对VAST Challenge 2013年网络安全可视分析竞赛数据进行分析,证明该系统可以直观地从宏观和微观两个层面感知网络安全状态,有效地识别网络攻击和辅助分析人员决策。 Considering that the management and analysis of the NetFlow log are becoming more difficult because of the NetFlow log' s increase in size and changing speed, a Visualization system for analysis of the NetFlow log by using the Time series map combined with the TreeMap according to the concept of network security visualization, was constructed to quickly, effectively identify network attacks and abnormal events in networks. By focusing on the six characteristics of information entropy, the system can successfully oversee the network security situation against the Time Series. At the same time, it can drill down into the details of invasion by using the TreeMap. The system also uses an image feature rule to construct visual figures for attack analysis and pattern exploration. Through the analysis of the VAST Challenge2013 competition data on this system, it was showed that the system can intuitively capture the network security status from the macro and micro levels, as well as effectively identify network attacks and give the support in decision-making.
出处 《高技术通讯》 CAS CSCD 北大核心 2014年第9期903-909,共7页 Chinese High Technology Letters
基金 国家自然科学基金(61103108 61402540) 湖南省科技计划博士后专项 中南大学博士后启动资金(2012RS4049)资助项目
关键词 网络安全可视化 安全态势评估 NETFLOW 信息熵 时间序列图 树图 network security visualization, security situational awareness, NetFlow, information entropy,Time Series, TreeMap
  • 相关文献

参考文献19

  • 1Cncert/Cc.2012年我国互联网网络安全态势综述.http://www.cert.org.cn/:国家互联网应急中心,2013.
  • 2Cncert/Cc,2012年中国互联网网络安全报告.北京:人民邮电出版社,2013.
  • 3赖积保,王慧强,金爽.基于Netflow的网络安全态势感知系统研究[J].计算机应用研究,2007,24(8):167-169. 被引量:21
  • 4Li B,Springer J,Bebis G,et al.A survey of network flow applications.Journal of Network and Computer Applications,2013,36(2):567-581.
  • 5Zhang H.Study on the TOPN abnormal detection based on the netflow data set.Computer and Information Science,2009,2(3):103-108.
  • 6Hsiao H W,Chen D N,Wu T J.Detecting hiding malicious website using network traffic mining approach.In:Proceedings of the 2nd International Conference on Education Technology and Computer (ICETC),Shanghai,China,2010.VS:276-280.
  • 7Yin K X,Zhu J Q.A novel DoS detection mechanism.In:Proceedings of the 2011 International Conference on Mechatronic Science,Electric Engineering and Computer (MEC),Jilin,China,2011.296-298.
  • 8Sperotto A,Pras A.Flow-based intrusion detection.In:Proceedings of the 2011 IFIP/IEEE International Symposium on Integrated Network Management,Dublin,Ireland,2011.958-963.
  • 9Francois J,Wang S,Bronzi W,et al.BotCloud:detecting botnets using MapReduce.In:Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security (WIFS),Foz do iguacu,Brazail,2011.1-6.
  • 10Lakkaraju K,Bearavolu R,Slagell A,et al.Closing-theloop in nvisionip:integrating discovery and search in security visualizations.In:Proceedings of the Visualization for Computer Security.(VizSEC 05),Minneapolis,USA,2005.75-82.

二级参考文献32

  • 1蒋文保,郝双,戴一奇,刘庭华.高速网络入侵检测系统负载均衡策略与算法分析[J].清华大学学报(自然科学版),2006,46(1):106-110. 被引量:29
  • 2詹艳艳,徐荣聪,陈晓云.基于斜率提取边缘点的时间序列分段线性表示方法[J].计算机科学,2006,33(11):139-142. 被引量:46
  • 3潘定,沈钧毅.时态数据挖掘的相似性发现技术[J].软件学报,2007,18(2):246-258. 被引量:41
  • 4BASS T,GRUBER D.A glimpse into the future of ID[EB/OL].(1999-09).[2006].http://www.usenix.org/ publications/login/1999-9/features/future.html.
  • 5BASS T.Intrusion detection systems and multi-sensor data fusion:creating cyberspace situational awareness[J].Communications of the ACM,2000,43(4):99-105.
  • 6BATSELL S G,RAO N S,SHANKAR M.Distributed intrusion detection and attack containment for organizational cyber security[EB/OL].[2006].http://www.ioc.ornl.gov/projects/documents/containment.pdf.
  • 7SHIFFLET J.A technique independent fusion model for network intrusion detection[EB/OL].(2005).[2006].http://www.wooster.edu/cs/mcurcsm2005/papers/paper22final.pdf.
  • 8MATHEUS C J,KOKAR M M,BACLAWSKI K.A core ontology for situation awareness[C]//Proc of the 6th International Conference of Information Fusion.Queensland:IEEE Press,2003:545-552.
  • 9LAU S.The spinning cube of potential doom[J].Communications of the ACM,2004,47(6):25-26.
  • 10GATES G,COLLINS M,DUGGAN M,et al.More Netflow tools:for performance and security[C]//Proc of the 18th Large Installation Systems Administration Conference.Atlanta:USENIX,2004:121-132.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部