Research on Network Security Visualization Based on Graph Database

被引:0
|
作者
Wang, Ye [1 ]
机构
[1] CETC, Res Inst 28, Nanjing 210000, Jiangsu, Peoples R China
关键词
Network security; Visualization; Graph database;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The combination of network security technology and data visualization has formed a new hot research direction - network security visualization. In this paper, network security visualization framework based web is proposed firstly, and then the composition of the framework and the main functions of its constituent elements is introduced. Secondly, based on the analysis of network security data structure, a network security data organization method based on graph database is proposed. Finally, based on the above method, a network security visualization prototype system is implemented. The results show that the two types of views of the system show network security situation from different dimensions, and it is feasible and effective to analyze network security data.
引用
收藏
页码:164 / 167
页数:4
相关论文
共 50 条
  • [21] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    [J]. CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [22] Research on Network Security Based on IPSec
    Liu, Yanru
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 150 - 154
  • [23] Cyber-Physical Security Assessment and Simulation Based on Graph Database
    Wang, Di
    Guo, Qinglai
    Song, Yan
    Gao, Kunlun
    Zhou, Aihua
    [J]. 2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [24] Visualization of Blog Network by a Keyword Based Graph with Interactive Filtering
    Gao, Jing
    Lai, Wei
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON IMAGE AND GRAPHICS (ICIG 2009), 2009, : 619 - 623
  • [25] Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
    Blake, Errol A.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (04) : 77 - 106
  • [26] Analysis Of Distribution Network Outrage Region Based On Graph Database
    Dai, Jiangpeng
    Chai, Bo
    Qiu, Hongbin
    Zhang, Bo
    Jiang, Wei
    Wang, Liang
    [J]. 2016 CHINA INTERNATIONAL CONFERENCE ON ELECTRICITY DISTRIBUTION (CICED), 2016,
  • [27] NetVis: A Network Security Management Visualization Tool Based On Treemap
    Kan, Zhongyang
    Hu, Changzhen
    Wang, Zhigang
    Wang, Guoqiang
    Huang, Xiaolong
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 18 - 21
  • [28] NETWORK SECURITY ANALYSIS BASED ON HOST-BASED ATTACK GRAPH
    Zhong, Shangqin
    Yao, Wenbin
    Ge, Haihui
    Yang, Yixian
    [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 88 - +
  • [29] Scalable Graph Convolutional Network based Link Prediction on a Distributed Graph Database Server
    Karunarathna, Anuradha
    Senarath, Dinika
    Madhushanki, Shalika
    Weerakkody, Chinthaka
    Dayarathna, Miyuru
    Jayasena, Sanath
    Suzumura, Toyotaro
    [J]. 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2020), 2020, : 107 - 115
  • [30] Research on Power Grid Topology Analysis Based on Graph Database
    Zhou, Aihua
    Qiu, Hongbin
    Pan, Sen
    Hu, Bin
    [J]. PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 841 - 844