期刊文献+

面向大规模网络的攻击预测可视分析系统设计与研究 被引量:1

Design and Research on Visual Analysis System of Prediction Attack for Large Scale Network
下载PDF
导出
摘要 由于网络安全数据量庞大和愈加复杂的网络入侵方式,传统的网络安全产品的攻击预测方法已变得不再适用。通过对网络流量日志的研究,提出了采用多模态可视化展示结构和快速异构树查询算法的实时网络流量日志可视化方法,开发并设计了大规模网络攻击预测可视分析系统Monic。结果表明,利用该系统通过交互分析能有效识别攻击者行为,预测网络攻击。 Traditional methods depends security products to prediction attack are no longer applied due to the large scale of network security data because the network intrusion mode become more and more Huge and complex. Through the studied of netflow data,a new method to real- time visual analysis netflow log with multi- modal display structure and heterogeneous tree netflow data organization structure was proposed and a visual analysis system of prediction attack for large- scale network named Monic is designed and researched. The ability of system to recognize attacker behavior and prediction network attack use this system through interaction analysis were indicated by results.
出处 《西南科技大学学报》 CAS 2015年第2期74-80,共7页 Journal of Southwest University of Science and Technology
基金 国家自然科学基金(61303127) 核废物与环境安全国防重点学科实验室(13zxnk12) 四川省教育厅重点项目(13ZA0169) 四川省科技创新苗子工程资助项目基金(2014-044)
关键词 可视分析 攻击预测 网络安全 多模态 大规模网络 Visual analysis Attack prediction Network security Multi-modal Large-scale network
  • 相关文献

参考文献14

  • 1BECKER R A, EICK S G, WILKS A R. Visualizing net- work data [ J ]. Visualization and Computer Graphics, IEEE Transactions on, 1995, 1( 1 ) : 16 - 28.
  • 2FORTIER S C, SHOMBERT L A. Network profiling and data visualization [ C ]. Proceedings of the 2000 IEEE Workshop on Information Assurance and Security. 2000.
  • 3赵颖,樊晓平,周芳芳,汪飞,张加万.网络安全数据可视化综述[J].计算机辅助设计与图形学学报,2014,26(5):687-697. 被引量:66
  • 4PAPADOPOULOS C, KYRIAKAKIS C, SAWCHUK A, et al. CyberSeer: 3D Audio - visual Immersion for Net Work Security and Management [ C ]. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. ACM, 2004 : 90 - 98.
  • 5AXELSSON S, SANDS D. Visualization for intrusion de- tection - hooking the worm [ J ]. Understanding Intrusion Detection Through Visualization, 2006 : 111 - 127.
  • 6COLOMBE J B, STEPHENS G. Statistical profiling and visualization for detection of malicious insider attacks on computer networks [ C ]. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. ACM, 2004:138 - 142.
  • 7GIRARDIN L, BRODBECK D. A Visual Approach for Monitoring Logs[C]. LISA. 1998, (98): 299 -308.
  • 8DUMAS M, ROBERT J, MCGUFFIN M J, et al. Alert- wheel: radial bipartite graph visualization applied to in- trusion detection system alerts [ J ]. Network, IEEE, 2012, 26(6) :12 - 18.
  • 9郑毅平.多源网络安全数据时序可视分析方法研究[J].网络安全技术与应用,2014(9):122-122. 被引量:3
  • 10PROMANN M, MAY A, WEI S, et al. Spring Rain: an ambient information display [ J ]. Proceedings of Visual Analyties Science and Technology. Los Alamitos: IEEE Computer Society Press, 2013 : 5 - 6.

二级参考文献50

  • 1张淑英.网络安全事件关联分析与态势评测技术研究[D].吉林:吉林大学,2012:31-36.
  • 2Shiravi H, Shiravi A, Ghorbani A A. A survey of visualization systems for network security [J]. IEEE Transactions on Visualization and Computer Graphics, 2012, 18(8) - 1313-1329.
  • 3Harrison L, Lu A. The future of security visualization: lessons from network visualization [J]. IEEE Network, 2012, 26(6): 6-11.
  • 4Becket R A, Eick S G, Wilks A R. Visualizing network data [J]. IEEE Transactions on Visualization and Computer Graphics, 1995, 1(1): 16-28.
  • 5Girardin L, Brodbeck D. A visual approach for monitoring logs [C] //Proceedings of Large Installation System Administration Conference. New York- ACM Press, 1998: 299-308.
  • 6VizSec Homepage [EB/OL]. [ 2014-01-09] http://www. vizsec, org. 2013.
  • 7VAST Challenge Homepage in vacommunity [EB/OL]. [ 2014-01-09] http://www, vacommunity, org/VAST + Challenge+ 2013. 2013.
  • 8Nataraj L, Karthikeyan S, Jacob G, et al. Malware images: visualization and automatic classification [C] //Proceedings of the 8th International Symposium on Visualization for Cyher Security. New York: ACM Press, 2011:4-11.
  • 9Mansmann F, G6bel T, Cheswick W. Visual analysis of complex firewall configurations [C] //Proceedings of the 9th International Symposium on Visualization for Cyber Security. New York.. ACM Press, 2012:1-8.
  • 10Koike H, Ohno K, Koizumi K. Visualizing cyber-attacks using IP matrix [C] //Proceedings of Visualization for Computer Security. Los Alamitos- IEEE Computer Society Press, 2005:91-98.

共引文献66

同被引文献9

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部