Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (2): 34-39.doi: 10.11959/j.issn.2096-109x.2018013

• Security data visualization • Previous Articles     Next Articles

Survey on the visualization technologies of threatening security data in cyber space

Fan ZHANG,Fan XIE,Jie JIANG   

  1. College of Computer Science,Zhejiang University of Technology,Hangzhou 310023,China
  • Revised:2018-01-29 Online:2018-02-15 Published:2018-03-08
  • Supported by:
    The National Natural Science Foundation of China(U1736109);The National Natural Science Foundation of China(61772456);The National Natural Science Foundation of China(U1609217)

Abstract:

With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.

Key words: cyber space security, associate analysis, visual analysis, artificial intelligence

CLC Number: 

No Suggested Reading articles found!