期刊文献+

多源网络安全数据时序可视分析方法研究 被引量:13

Visualization of Multi-source Network Security Data Based on Stacked Stream Graph
下载PDF
导出
摘要 网络安全可视化通过提供有效的信息可视化工具,提升网络安全分析师在解决网络安全问题过程中的认知能力,从而更高效地识别网络异常和分析安全趋势.堆叠流图是一种新颖的可视化技术,它优美地展示了多时间序列数据在时间线上的相互关系与发展趋势.本文将堆叠流图引入网络安全可视化中,并根据网络安全事件的多源关联性,提出了擅长多时序对比分析的堆叠流图设计方法,研究了传统堆叠流图和对比堆叠流图在实现过程中堆叠基准函数计算、曲线插值、排序和标签布局算法等问题,最后通过实验验证了基于对比堆叠流图的多源网络安全数据时序可视分析方法的有效性. Network security visualization provides the analysts with better tools to detect anomalies, identify correlations of security e- vents and predict the trends of network security. Stacked stream graphfocuses on temporal thematic change of multiple time series data over time and allows users to discern patterns that suggest their relationships or trends. In this paper, stacked stream graph is intro- duced to the visualization of network security. Methods of the analysis of network security incidents based on multi-source are pro- posed and a comparative stacked stream graph for multi-subject is implemented, and then the problems of baseline function, curve in- terpolation, layer ordering and labeling for standard and comparative stacked stream graph are discussed. Finally, the effectiveness of system based on stacked stream graph is verified through some experiments and evaluations.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第4期906-910,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61103108)资助 湖南省科技计划博士后专项项目(2012RS4049)资助 国家科技支撑计划(2012BAH08B01)资助 中南大学博士后启动资金项目资助 湖南省自然科学基金项目(12JJ3062)资助
关键词 可视化 可视分析 网络安全 堆叠流图 visualization visual analysis network security stacked stream graph
  • 相关文献

参考文献3

二级参考文献55

  • 1孙亮,李东,张涛.网络攻击图的自动生成[J].计算机应用研究,2006,23(3):119-122. 被引量:13
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 3童明荣,薛恒新,林琳.基于Holt-Winter模型的铁路货运量预测研究[J].铁道运输与经济,2007,29(1):79-81. 被引量:10
  • 4Lau S. The spinning cube of potential doom. Communications of the ACM, 2004, 47(6): 25-26
  • 5Lakkaraju K, Yurcik W, Lee A J. NVisionlP: Netflow visualizations of system state for security situational awareness// Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC, 2004: 65-72
  • 6Yin X, Yurcik W, Treaster M. VisFlowConnect: Netflow visualizations of link relationships for security situational awareness//Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC, 2004:26-34
  • 7Bass T. Intrusion detection systems & multisensor data fusion: Creating cyberspace situational awareness. Communications of the ACM, 2000, 43(4): 99-105
  • 8D' Ambrosio B. Security situation assessment and response evaluation (SSARE)//Proceedings of the DARPA Informa- tion Survivability Conference & Exposition Ⅱ. Anaheim, 2001 : 387-394
  • 9Yegneswaran V, Barford P, Paxson V. Using honeynets for internet situational awareness//Proceedings of the 4th Workshop on Hot Topics in Networks. Maryland, 2005
  • 10George E P B, Gwilym M J. Time Series Analysis: Forecasting and Control. San Francisco: Holden Day Inc. , 1976

共引文献122

同被引文献63

引证文献13

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部