期刊文献+

网络安全态势感知融入天镜系统的关键技术研究 被引量:1

Research on Key Technologies of Network Security Situation Awareness Integration into Tianjing System
下载PDF
导出
摘要 为构建全业务、全流程、一体化、可视化的气象业务实时监控系统,提升天镜系统监控集约化能力,该文以态势感知系统融入天镜为例,从态势感知数据的确定、数据的融入、评估指标的设计、数据的可视化4个方面阐述了融入流程。基于ElasticSearch、微服务和Java云原生可视化等关键技术,从脆弱性业务、漏洞风险态势、实时危险监控等方面设计态势感知数据在天镜中的可视化展示。 In order to build a real-time meteorological business monitoring system with full business and full process integration and visualization,and improve the intensive monitoring capability of the Tianjing system,this paper takes the integration of situational awareness system into Tianjing as an example,expounds the integration process from four aspects:the determination of situational awareness data,the integration of data,the design of evaluation indicators,and the visualization of data.Based on the key technologies such as ElasticSearch,microservice and Java cloud native visualization,the visual display of situation awareness data in the Tianjing is designed from the aspects of vulnerability business,vulnerability risk situation,real-time risk monitoring,etc.
作者 徐晓庆 李新庆 黄艳红 陈增境 XU Xiaoqing;LI Xinqing;HUANG Yanhong;CHEN Zengjing(Key Laboratory for Meteorological Disaster Monitoring and Early Warning and Risk Management of Characteristic Agriculture in Arid Regions,CMA,Yinchuan 750002,China;Ningxia Key Lab of Meteorological Disaster Prevention and Reduction,Yinchuan 750002,China)
出处 《中低纬山地气象》 2023年第3期93-97,共5页 Mid-low Latitude Mountain Meteorology
基金 中国气象局旱区特色农业气象灾害监测预警与风险管理重点实验室科研项目(CAMP-202005)。
关键词 气象信息 态势感知 天镜 meteorological information situational awareness Tianjing
  • 相关文献

参考文献9

二级参考文献41

  • 1沈文海.向气象数据中心演进[J].气象科技进展,2012,2(4):53-57. 被引量:8
  • 2王慧强,赖积保,朱亮,梁颖.网络态势感知系统研究综述[J].计算机科学,2006,33(10):5-10. 被引量:122
  • 3BASS T,GRUBER D.A glimpse into the future of id[EB/OL].(1999-11-16)[2007-04-20].http://www.usenix.org/publications/login/1999-9/features/future.html.
  • 4Carnegie Mellon's SEI.System for Internet Level Knowledge (SILK)[EB/OL].[2007-04-20].http://silktools.sourceforge.net.
  • 5SHIFFLET J.A technique independent fusion model for network intrusion detection[C]// Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics.2005,3(1):13-19.
  • 6YURCIK W,BARLOW J,LAKKARAJU K,et al.Two visual computer network security monitoring tools incorporating operator interface requirements[C]// ACM CHI Workshop on Human-Computer Interaction and Security Systems (HCISEC).New York:ACM Press,2003:54.
  • 7LAU S.The spinning cube of potential doom[J].Communications of the ACM,2004,47(6):25-26.
  • 8YURCIK W.Visualizing netflows for security at line speed:the SIFT tool suite[C/OL]// 19th Usenix Large Installation System Administration Conference(LISA),San Diego,2005.http://www.usenix.org/events/lisa05/tech/full_papers/yurcik/yurcik.pdf.
  • 9北京理工大学信息安全与对抗技术研究中心.网络安全态势评估系统技术白皮书[EB/OL].[2007-04-20].http://www.thinkor.com/product/download/网络安全态势评估系统技术白皮书2.doc.
  • 10Shifflet J. A Technique Independent Fusion Model For Network Intrusion Detection[J]. Proceedings of the Mid states Conference on Undergraduate Research in Com purer Science and Mathematics. 2005,3(1) : 13-19.

共引文献121

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部