The Research on Network Security Visualization Key Technology

被引:1
|
作者
Li, Xiaoyan [1 ,2 ]
Wang, Qingxian [1 ]
Yang, Lin [2 ]
Luo, Xiangyang [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Henan, Peoples R China
[2] Inst China Elect Syst Engn, Beijing 100141, Peoples R China
关键词
Situation awareness; Security situation; Quantification; Visualization;
D O I
10.1109/MINES.2012.236
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Managing complex enterprise networks requires an understanding at a fine granularity than traditional network monitoring. The ability to correlate and visualize the dynamics and inter-relationships among various network components such as hosts, users, and applications is non-trivial. Network security visualization is a highlighted topic of network security research in recent years, The existing research situation of network security visualization is analyzed. the paper first proposed the network security situation awareness model, and analysis network security situation awareness method, at last, and designed and implemented the security situation visualization prototype system based on geographic information systems, network topology graph, attack paths. The security situation data show in multiple views, multi-angle, multi-level display to the user by visualization technology, therefore the performance of the security situation will be more accurate and vivid, assessment of network security situation become timely and accurate, laying the foundation for rapid decision-making.
引用
收藏
页码:983 / 988
页数:6
相关论文
共 50 条
  • [41] Research on Computer Network Security Technology Based on the BP Neural Network
    He, Xiaochun
    Kan, Ping
    [J]. 2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 581 - 584
  • [42] Research on the Framework and Key Technologies of Panoramic Visualization for Smart Distribution Network
    Du, Jian
    Sheng, Wanxing
    Lin, Tao
    Lv, Guangxian
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967
  • [43] The New Exploring for the Key Technology of Distributed Network Security System Design
    Gong, Honghui
    Xu, Yanwei
    Zhang, Ting
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 1874 - 1878
  • [44] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [45] Research on WPKI Key Technology and Application in E-Commerce Security
    Yu, Jiangtao
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 1, 2009, : 496 - 500
  • [46] Research on Key Technology of Static CT Luggage Security Inspection System
    Tang L.
    Zhang G.
    Zhang J.
    Yan P.
    Zhang Y.
    [J]. Yuanzineng Kexue Jishu/Atomic Energy Science and Technology, 2021, 55 (05): : 933 - 938
  • [47] Research on Network Security Collaborative Defense Technology Based on Swarm Intelligence and Big Data Network Security
    Bingjie, Yu
    Huifeng, Yang
    Chenjun, Sun
    Zhi, Zhang
    Jinghang, Fan
    [J]. Engineering Intelligent Systems, 2021, 29 (06): : 379 - 386
  • [48] Research on Network Security Management and Protection Technology of Information System
    Xu, Raoshan
    [J]. INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 1036 - 1042
  • [49] Research on Computer Network Security Based on Data Encryption Technology
    Zhang, Yicong
    Zhou, Shujun
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
  • [50] Experimental Teaching Research and Practice of "Computer Network Security Technology"
    Peng Hehuan
    Wei Li
    Ran Xinxia
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 610 - 612