NetVis: A Network Security Management Visualization Tool Based On Treemap

被引:11
|
作者
Kan, Zhongyang [1 ]
Hu, Changzhen [1 ]
Wang, Zhigang [1 ]
Wang, Guoqiang [1 ]
Huang, Xiaolong [1 ]
机构
[1] Beijing Inst Technol, Lab Comp Network Def Technol, Beijing 100081, Peoples R China
关键词
network security visualization; network management; treemap; prefuse;
D O I
10.1109/ICACC.2010.5487236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet and the expanding application fields of network applications, it is not enough to maintain the network security only depend on those professional network technical administrators. In this paper a novel visualization tool based on treemap, which is called NetVis, is introduced to bind the network security technique and general network management together in an integrated visualization. NetVis is designed in 2D view. The experiments show that NetVis can not only detect the abnormal activities in the network, but also make the network management more intuitive and efficient.
引用
收藏
页码:18 / 21
页数:4
相关论文
共 50 条
  • [41] Formal integrated network security analysis tool: formal query-based network security configuration analysis
    Maity, Soumya
    Bera, P.
    Ghosh, Soumya K.
    Al-Shaer, Ehab
    IET NETWORKS, 2015, 4 (02) : 137 - 147
  • [42] Study of the Security in Network Management Based on Mobile Agents
    CHEN Zhi~1 WANG Ru-chuan~(1
    2.State Key Laboratory for Novel Software Technology
    The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 37 - 42
  • [43] Network security management based on data fusion technology
    Niu Yi
    Zheng Qi-Lun
    Peng Hong
    7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 889 - 892
  • [44] Fog computing network security based on resources management
    Daoud, Wided Ben
    Othmen, Salwa
    Hamdi, Monia
    Khdhir, Radhia
    Hamam, Habib
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [45] Agent-based intelligent network security management
    Hu Gang-feng
    Li De-yi
    Chen Gui-sheng
    Wu Zuo-shun
    Proceedings of 2006 International Conference on Artificial Intelligence: 50 YEARS' ACHIEVEMENTS, FUTURE DIRECTIONS AND SOCIAL IMPACTS, 2006, : 493 - 496
  • [46] Fog computing network security based on resources management
    Wided Ben Daoud
    Salwa Othmen
    Monia Hamdi
    Radhia Khdhir
    Habib Hamam
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [47] Security extension to grasshopper for network management based policy
    Yang, B
    Liu, DY
    Yang, K
    Yu, WJ
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 10 - 15
  • [48] Features of a Visualization Tool for Specification and Analysis of Security Protocol
    Mayouf, Mabroka Ali
    Shukur, Zarina
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 2278 - 2282
  • [49] An Interactive Visualization System for Network Security Data
    Li Zheng
    Gang Yu
    Yuntian Zheng
    Journal of Signal Processing Systems, 2023, 95 : 393 - 405
  • [50] A survey of security visualization for computer network logs
    Zhang, Yanping
    Xiao, Yang
    Chen, Min
    Zhang, Jingyuan
    Deng, Hongmei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : 404 - 421