The Research on Network Security Visualization Key Technology

被引:1
|
作者
Li, Xiaoyan [1 ,2 ]
Wang, Qingxian [1 ]
Yang, Lin [2 ]
Luo, Xiangyang [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Henan, Peoples R China
[2] Inst China Elect Syst Engn, Beijing 100141, Peoples R China
关键词
Situation awareness; Security situation; Quantification; Visualization;
D O I
10.1109/MINES.2012.236
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Managing complex enterprise networks requires an understanding at a fine granularity than traditional network monitoring. The ability to correlate and visualize the dynamics and inter-relationships among various network components such as hosts, users, and applications is non-trivial. Network security visualization is a highlighted topic of network security research in recent years, The existing research situation of network security visualization is analyzed. the paper first proposed the network security situation awareness model, and analysis network security situation awareness method, at last, and designed and implemented the security situation visualization prototype system based on geographic information systems, network topology graph, attack paths. The security situation data show in multiple views, multi-angle, multi-level display to the user by visualization technology, therefore the performance of the security situation will be more accurate and vivid, assessment of network security situation become timely and accurate, laying the foundation for rapid decision-making.
引用
收藏
页码:983 / 988
页数:6
相关论文
共 50 条
  • [1] Research of network security situation index system and visualization technology
    Li, Xiao-Yan
    Wang, Qing-Xian
    Yang, Lin
    [J]. Tongxin Xuebao/Journal on Communications, 2011, 32 (11 A): : 109 - 118
  • [2] Applications of Visualization Technology for Network Security
    Tang Haina
    Han Chunjing
    Ge Jingguo
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1038 - 1042
  • [3] Research on the Network Technology Security
    Rong, Wang
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1739 - 1741
  • [4] Research on Key Technology of Network Security Situation Awareness of Private Cloud in Enterprises
    Liu Qing
    Zhu Boyu
    Wan Jinhua
    Li Qinqian
    [J]. 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2018, : 462 - 466
  • [5] Analysis and Research on the Security Key Technology of Grid
    Longjun, Zhang
    [J]. FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 334 - 338
  • [6] A Key Technology Survey and Summary of Dynamic Network Visualization
    Yu Shaobo
    Wu Lingda
    [J]. PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 474 - 478
  • [7] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [8] Research of Trusted Network Security Technology
    Gan, XiaoYing
    Liu, Bin
    [J]. ADVANCES IN MECHANICAL ENGINEERING, PTS 1-3, 2011, 52-54 : 713 - +
  • [9] Research on Wireless Network Security Technology
    Yang, Wen-jing
    Li, Zhi-yuan
    Zhou, Huai-jun
    Li, Ran
    Zhao, Hai-yan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 296 - 299
  • [10] Research of Computer Network Security Technology
    Tan, Juan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 736 - 740