期刊文献+

多种可视化技术相结合的网络安全数据分析研究

Network-Security-Data Analysis and Research Implemented by Combining Multiple Visulization Technologies
下载PDF
导出
摘要 网络安全可视化是网络安全研究中的重要环节,它通过可视分析,为网络安全员提供一种分析网络结构和识别网络异常的新方法。针对网络监控日志数据量大、维度高等特点,对网络安全可视化分析方法进行研究和实验。采用网络拓扑图、散点图、柱状图、平行坐标等可视化方法,对网络的体系结构、异常行为、通信模式进行可视分析。使用China Vis2016挑战赛的数据对以上可视化方法进行验证,实验结果表明,以上几种可视方法都能针对不同的问题给出解决方案,其对分析网络安全数据可行、有效。 Network security visualization, as an important part of network security reaearch, could provide a new method for network security officer to visually analyze the network structure and identify the abnormity of network security. In view of large amount of log data for network monitoring and high dimension, the visualization of network security analysis method is studied and verified. With network topology, scatter diagram, histogram, parallel coordinate and other visualization methods, the visual analysis could be done on network architecture, abnormal behavior, and communication mode. The experiment with the data of China Vis2016 challenge verifies the above visualization methods, and also indicates that the above several visual methods can give solutions for different problems, and thus are feasible and effective for visual analysis of network security data.
作者 廖雨婷
出处 《通信技术》 2016年第12期1680-1685,共6页 Communications Technology
基金 国家自然科学基金(No.41371383)~~
关键词 网络拓扑图 散点图 平行坐标 可视分析 网络安全 network topology scatter diagram parallel coordinate visualization analysis network security
  • 相关文献

参考文献4

二级参考文献37

  • 1YIN X, YURCIK W, TREASTER M. Visflowconnect: Netflowvisualizations of Link Relationships for Security Situational Awareness[C]. Washington, DC, USA: ACM Conference on Computer and Communications Security, 2004: 312-220.
  • 2YIN Xianxin, YUREIK William, SLAGELL Adam. The Design of VisFlowConnect-IP: a Link Analysis System for IP Security Situational Awareness[C]. [s.n.]: IWIA, 2005: 212-223.
  • 3CHOI Hyuusang, LEE Heejo, KIM Hyogon. Fast Detection and Visualization of Network Attacks on Parallel Coordinates[J]. Computer & Security, 2009, 28: 276-288.
  • 4GUO Peihong, XIAO He, ZHOU Hong. Scattering Points in Parallel Coordinates[J]. IEEE Transactions on Visualization and Computer Graphics, 2009, 15(6): 79-65.
  • 5李春雨,等.计算机图形学及实用编程技术[M].北京:北京航空航天大学出版社,2008.
  • 6赖积保,王慧强,金爽.基于Netflow的网络安全态势感知系统研究[J].计算机应用研究,2007,24(8):167-169. 被引量:21
  • 7SH1RAVI tt. SHIRAVI A, GFtORBANI A. A survey of visualiza- tion systems for network security[ J]. IEEE Transactions on Visual- ization and Computer Graphics, 2012, 18(8) : 1313 - 1329.
  • 8F1NK G A, MUESSIG P, NORTH C. Visual correlation of host processes and network traffic[ C]// Proceedings of the 2005 IEEE Workshop on Visualization for Computer Security. Piscataway: IEEE. 2005:11 - 19.
  • 9BOSCHETTI A. MUELDER C, SALGARELH 1,, et ttl. TVi: a vis- ual querying system fi~r network monitoring and anomaly detection [ C]// Proceedings of the 8th International Symposiun~ on Visualiza- tion for Cyber Security. New York: ACM. 2011 : 1 - 10.
  • 10BRAUN L, VOLKE M, SCHI,AMP J, et cd. Flow-inspector: a framework fur visualizing network flow data using current Web tech- nologies[ J]. Computing, 2014, 96( 1 ) : 15 - 26.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部