当前位置:文档之家› 网络安全数据可视化综述

网络安全数据可视化综述

万方数据

网络安全数据可视化综述

作者:赵颖, 樊晓平, 周芳芳, 汪飞, 张加万, Zhao Ying, Fan Xiaoping, Zhou Fangfang, Wang Fei, Zhang Jiawan

作者单位:赵颖,周芳芳,Zhao Ying,Zhou Fangfang(中南大学信息科学与工程学院 长沙410083), 樊晓平,Fan Xiaoping(中南大学信息科学与工程学院 长沙410083 ;湖南财政经济学院网络化系统研究所 长沙

410205), 汪飞,Wang Fei(湖南师范大学数学与计算机学院 长沙410081), 张加万,Zhang Jiawan(天津

大学软件学院 天津300072)

刊名:

计算机辅助设计与图形学学报

英文刊名:Journal of Computer-Aided Design & Computer Graphics

年,卷(期):2014,26(5)

参考文献(48条)

1.吕良福;张加万;孙济洲网络安全可视化研究综述 2008(08)

2.Shiravi H;Shiravi A;Ghorbani A A A survey of visualization systems for network security 2012(08)

3.Harrison L;Lu A The future of security visualization:lessons from network visualization 2012(06)

4.Becker R A;Eick S G;Wilks A R Visualizing network data 1995(01)

5.Girardin L;Brodbeck D A visual approach for monitoring logs 1998

6.VizSec Homepage 2014

7.VAST Challenge Homepage in vacommunity 2014

8.Nataraj L;Karthikeyan S;Jacob G Malware images:visualization and automatic classification 2011

9.Mansmann F;G(o)bel T;Cheswick W Visual analysis of complex firewall configurations 2012

10.Koike H;Ohno K;Koizumi K Visualizing cyber attacks using IP matrix 2005

11.Atkison T;Pensy K;Nicholas C Case study:visualization and information retrieval techniques for network

intrusion detection 2001

12.Le Mal E;Kohara M;Hori Y Interactively combining 2D and 3D visualization for network traffic monitoring 2006

13.Mansmann F;Keim D A;North S C Visual analysis of network traffic for resource planning,interactive

monitoring,and interpretation of security threats 2007(06)

14.McPherson J;Ma K L;Krystosk P Portvis:a tool for port-based detection of security events 2004

15.Zhao Y;Liang X;Wang Y MVSec:a novel multiview visualization system for network security 2013

16.Plonka D FlowScan:a network traffic flow reporting and visualization tool 2000

17.Goodall J R;Lutters W G;Rheingans P Preserving the big picture:visual network traffic analysis with tnv 2005

18.Bertini E;Hertzog P;Lalanne D SpiralView:towards security policies assessment through visual correlation of network resources with evolution of alarms 2007

19.Abdullah K;Lee C;Conti G Visualizing network data for intrusion detection 2005

20.Ball R;Fink G A;North C Home-centric visualization of network traffic for security administration 2004

21.Fischer F;Mansmann F;Keim D A Large-scale network monitoring for visual analysis of attacks 2008

22.Liao Q;Shi L;Wang C Visual analysis of large-scale network anomalies 2013(3/4)

23.Tsigkas O;Thonnard O;Tzovaras D Visual spam campaigns analysis using abstract graphs representation 2012

24.Yu T H;Fuller B W;Bannick J H Integrated Environment Management for Information Operations Testbeds 2008

https://www.doczj.com/doc/0e6829620.html,kkaraju K;Yurcik W;Lee A J NVisionIP:netflow visualizations of system state for security situational awareness 2004

26.Fischer F;Fuchs J;Vervier P A VisTracer:a visual analytics tool to investigate routing anomalies in traceroutes 2012

27.Xiao L;Gerth J;Hanrahan P Enhancing visual analysis of network traffic using a knowledge representation 2006

28.Lee C P;Trost J;Gibbs N Visual firewall:real-time network security monitor 2005

29.Choi H;Lee H;Kim H Fast detection and visualization of network attacks on parallel coordinates 2009(05)

30.Wright C V;Monrose F;Masson G M Using visual motifs to classify encrypted traffic 2006

31.Mansman F;Meier L;Keim D A Visualization of host behavior for network security 2008

32.Koike H;Ohno K SnortView:visualization system of snort logs 2004

33.Abdullah K;Lee C P;Conti G J IDS RainStorm:Visualizing IDS Alarms 2005

34.Hideshima Y;Koike H STARMINE:a visualization system for cyber-attacks 2006

35.Alsaleh M;Alqahtani A;Alarifi A Visualizing PHPIDS log files for better understanding of web server attacks 2013

36.Livnat Y;Agutter J;Moon S Visual correlation for situational awareness 2005

37.Zhou F;Shi R;Zhao Y NetSecRadar:a visualization system for network security situational awareness 2013

38.Dumas M;Robert J M;McGuffin M J Alertwheel:radial bipartite graph visualization applied to intrusion detection system alerts 2012(06)

39.Zhao Y;Zhou F F;Fan X P IDSRadar:a real-time visualization framework for IDS alerts 2013(08)

40.Shiravi H;Shiravi A;Ghorbani A A Situational assessment of intrusion alerts:a multi attack scenario evaluation 2011

41.Noel S;Jacobs M;Kalapa P Multiple coordinated views for network attack graphs 2005

42.Williams L;Lippmann R;Ingols K GARNET:a graphical attack graph and reachability network evaluation tool 2008

43.Bass T Intrusion detection systems and multisensor data fusion 2000(04)

44.Yin X;Yurcik W;Treaster M VisFlowConnect:netflow visualizations of link relationships for security situational awareness 2004

45.Fischer F;Fuchs J;Mansmann F BANKSAFE:visual analytics for big data in large scale computer networks 2013

46.Chen S;Merkle F;Schaefer H AnNetTe collaboration oriented visualization of network data 2013

47.Benson J R;Ramarajan J NOCturne:a scalable large format visualization for network operations 2013

48.Promann M;Ma Y A;Wei S SpringRain:an ambient information display 2013

引用本文格式:赵颖.樊晓平.周芳芳.汪飞.张加万.Zhao Ying.Fan Xiaoping.Zhou Fangfang.Wang Fei.Zhang Jiawan网络安全数据可视化综述[期刊论文]-计算机辅助设计与图形学学报 2014(5)

相关主题
文本预览
相关文档 最新文档