Research on Network Security Visualization Based on Graph Database

被引:0
|
作者
Wang, Ye [1 ]
机构
[1] CETC, Res Inst 28, Nanjing 210000, Jiangsu, Peoples R China
关键词
Network security; Visualization; Graph database;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The combination of network security technology and data visualization has formed a new hot research direction - network security visualization. In this paper, network security visualization framework based web is proposed firstly, and then the composition of the framework and the main functions of its constituent elements is introduced. Secondly, based on the analysis of network security data structure, a network security data organization method based on graph database is proposed. Finally, based on the above method, a network security visualization prototype system is implemented. The results show that the two types of views of the system show network security situation from different dimensions, and it is feasible and effective to analyze network security data.
引用
收藏
页码:164 / 167
页数:4
相关论文
共 50 条
  • [31] Security Service Function Chain Based on Graph Neural Network
    Li, Wei
    Wang, Haomin
    Zhang, Xiaoliang
    Li, Dingding
    Yan, Lijing
    Fan, Qi
    Jiang, Yuan
    Yao, Ruoyu
    [J]. INFORMATION, 2022, 13 (02)
  • [32] An approach to evaluate network security risk based on attack graph
    Hu, Xiaoyun
    Yu, Yang
    Xia, Chunhe
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
  • [33] Network security risk analysis based on graph theoretical methods
    Lin, Zefu
    [J]. Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 510 - 516
  • [34] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [35] A Quantitative Method for Evaluating Network Security Based on Attack Graph
    Zheng, Yukun
    Lv, Kun
    Hu, Changzhen
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
  • [36] The Security of Database Network Model Based on Fractional Differential Equations
    Sun, Jianzhao
    Yang, Kun
    Alshalabi, Riyad
    [J]. APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2022, 8 (01) : 945 - 952
  • [37] Research Advances of Social Security Problems in China——Visualization Research based on Bibliometrics
    赵琳
    [J]. 校园英语, 2016, (12) : 250 - 251
  • [38] The Future of Security Visualization: Lessons from Network Visualization
    Harrison, Lane
    Lu, Aidong
    [J]. IEEE NETWORK, 2012, 26 (06): : 6 - 11
  • [39] Research on the security of statistical database
    Yang, XR
    Wang, GY
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN & COMPUTER GRAPHICS, 1999, : 257 - 260
  • [40] An Overview of Research on Knowledge Graph Completion Based on Graph Neural Network
    Yue, Wu
    Haichun, Sun
    [J]. Data Analysis and Knowledge Discovery, 2024, 8 (03) : 10 - 28