Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (2): 34-39.doi: 10.11959/j.issn.2096-109x.2018013
• Security data visualization • Previous Articles Next Articles
Fan ZHANG,Fan XIE,Jie JIANG
Revised:
2018-01-29
Online:
2018-02-15
Published:
2018-03-08
Supported by:
CLC Number:
Fan ZHANG, Fan XIE, Jie JIANG. Survey on the visualization technologies of threatening security data in cyber space[J]. Chinese Journal of Network and Information Security, 2018, 4(2): 34-39.
[1] | FISCHER F , FUCHS J , MANSMANN F ,et al. BANKSAFE:visual analytics for big data in large-scale computer networks[J]. Information Visualization, 2015,14(1): 51-61. |
[2] | 张焕国, 韩文报, 来学嘉 ,等. 网络空间安全综述[J]. 中国科学:信息科学, 2016,46(2): 125-164. |
ZHANG H G , HAN W B , LAI X J ,et al. Survey on cyberspace security[J]. SCIENTIA SINICA Information is, 2016,46(2): 125-164. | |
[3] | SHIRAVI H , SHIRAVI A , GHORBANI A A . A survey of visualization systems for network security[J]. IEEE Transactions on Visualization and Computer Graphics, 2012,18(8): 1313-1329. |
[4] | ZHANG T Y , WANG X M , LI Z Z ,et al. A survey of network anomaly visualization[J]. Science China:Information Sciences, 2016,59(1): 1-17. |
[5] | STAHELI D , YU T , JORDAN C R ,et al. Visualization evaluation for cyber security:trends and future directions[C]// IEEE Workshop on Visualization for Computer Security (VizSec). 2014. |
[6] | POST T , WISCHGOLL T , BRYANT A R ,et al. Visually guided flow tracking in software-defined networking[C]// IEEE Workshop on Visualization for Computer Security(VizSec). 2016. |
[7] | WARD M O , GRINSTEIN G , KEIM D . Interactive data visualization:foundations,techniques,and applications[M]. A K Peters Press, 2010. |
[8] | 陈为, 沈则潜, 陶煜波 . 数据可视化[M]. 北京: 电子工业出版社, 2013. |
CHEN W , SHEN Z Q , TAO Y B . Data visualization[M]. Beijing: Publishing House of Electronics Industry, 2013. | |
[9] | 李建华 . 网络空间威胁情报感知、共享与分析技术综述[J]. 网络与信息安全学报, 2016,2(2): 16-29. |
LI J H . Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space[J]. Chinese Journal of Network and Information Security, 2016,2(2): 16-29. | |
[10] | 李燕, 曹宝香, 马兆丰 ,等. 关联分析算法在安全管理平台中的研究与应用[J]. 计算机技术与发展, 2013,23(10): 107-110,114. |
LI Y , CAO B X , MA Z F ,et al. Research and application of correlation analysis in security management platform[J]. Computer Technology and Development, 2013,23(10): 107-110,114. | |
[11] | 赵颖, 樊晓平, 周芳芳 ,等. 网络安全数据可视化综述[J]. 计算机辅助设计与图形学学报, 2014,26(5): 687-697. |
ZHAO Y , FAN X P , ZHOU F F ,et al. A survey on network security data visualization[J]. Journal of Computer-Aided Design & Computer Graphics, 2014,26(5): 687-697. | |
[12] | 赵颖, 樊晓平, 周芳芳 ,等. 大规模网络安全数据协同可视分析方法研究[J]. 计算机科学与探索, 2014,8(7): 848-857. |
ZHAO Y , FAN X P , ZHOU F F ,et al. Research on collaborative visual analysis of large scale network security data[J]. Journal of Frontiers of Computer Science and Technology, 2014,8(7): 848-857. | |
[13] | 赵颖, 樊晓平, 周芳芳 ,等. 多源网络安全数据时序可视分析方法研究[J]. 小型微型计算机系统, 2014,35(4): 906-910. |
ZHAO Y , FAN X P , ZHOU F F ,et al. Visualization of multi-source network security data based on stacked stream graph[J]. Journal of Chinese Computer Systems, 2014,35(4): 906-910. | |
[14] | 张胜, 施荣华, 赵颖 . 基于多元异构网络安全数据可视化融合分析方法[J]. 计算机应用, 2015,35(5): 1379-1384,1416. |
ZHANG S , SHI R H , ZHAO Y . Visual fusion and analysis for multivariate heterogeneous network security data[J]. Journal of Computer Applications, 2014,35(4): 1379-1384,1416. | |
[15] | 赵立军, 张健 . 基于堆叠条形图和平行坐标的网络数据安全可视化分析方法研究[J]. 装备学院学报, 2015,26(5): 86-90. |
ZHAO L J , ZHANG J . Study on network data security visualization based on stacked bar chart and parallel coordinates[J]. Journal of Equipment Academy, 2015,26(5): 86-90. | |
[16] | 吴亚东, 蒋宏宇, 赵思蕊 ,等. 网络安全数据3D可视化方法[J]. 电子科技大学学报, 2015,44(4): 594-598. |
WU Y D , JIANG H Y , ZHAO S R ,et al. 3D visualization method for network security data[J]. Journal of University of Electronic Science and Technology of China, 2015,44(4): 594-598. | |
[17] | BECKER R A , EICK S G , WILKS A R . Visualizing network data[J]. IEEE Transactions on Visualization and Computer Graphics, 1995,1(1): 16-28. |
[18] | MCPHERSON J , MA K , KRYSTOSK P ,et al. PortVis:a tool for port-based detection of security events[C]// IEEE Symposium on Visualization for Cyber Security(VizSec). 2004. |
[19] | LAKKARAJU K , YURCIK W , BEARAVOLU R ,et al. NVisionIP:an interactive network flow visualization tool for security[C]// IEEE International Conference on Systems,Man and Cybernetics, 2004. |
[20] | GOODALL J R , LUTTERS W G , RHEINGANS P ,et al. Preserving the big picture:visual network traffic analysis with TNV[C]// IEEE Workshop on Visualization for Computer Security(VizSec). 2005. |
[21] | CONTI G , ABDULLAH K , GRIZZARD J ,et al. Countering security analyst and network administrator overload through alert and packet visualization[J]. IEEE Computer Graphics and Applications, 2006,26(2): 60-70. |
[22] | NYARKO K , CAPERS T , SCOTT C ,et al. Network intrusion visualization with NIVA,an intrusion detection visual analyzer with paptic integration[C]// The 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. 2002. |
[23] | LIVNAT Y , AGUTTER J , MOON S ,et al. A visualization paradigm for network intrusion detection[C]// IEEE SMC Information Assurance Workshop. 2005. |
[24] | ABDULLAH K , LEE C , CONTI G ,et al. IDS RainStorm:visualizing IDS alarms[C]// IEEE Workshop on Visualization for Computer Security(VizSec). 2005. |
[25] | BERTINI E , HERTZOG P , LALANNE D . SpiralView:towards security policies assessment through visual correlation of network resources with evolution of alarms[C]// IEEE Conference on Visual Analytics Science and Technology (VAST’07). 2007. |
[26] | SIADATI H , SAKET B , MEMON N . Detecting malicious logins in enterprise networks using visualization[C]// IEEE Symposium on Visualization for Cyber Security (VizSec). 2016. |
[27] | SYAMKUMAR M , DURAIRAJAN R , BARFORD P . Bigfoot:a geo-based visualization methodology for detecting BGP threats[C]// IEEE Symposium on Visualization for Cyber Security (VizSec). 2016. |
[28] | LING X , GERTH J , HANRAHAN P . Enhancing visual analysis of network traffic using a knowledge representation[C]// IEEE Symposium on Visual Analytics Science and Technology. 2006. |
[29] | SHEN Z Q , MA K L , ELIASSI-RAD T . Visual analysis of large heterogeneous social networks by semantic and structural abstraction[J]. IEEE Transactions on Visualization and Computer Graphics, 2006,12(6): 1427-1439. |
[30] | IANNACONE M , BOHN S , NAKAMURA G ,et al. Developing an ontology for cyber security knowledge graphs[C]// The Cyber and Information Security Research. 2015. |
[31] | AUPETIT M , ZHAUNIAROVICH Y , VASILIADISM G ,et al. Visualization of actionable knowledge to mitigate DRDoS attacks[C]// IEEE Symposium on Visualization for Cyber Security (VizSec). 2016. |
[32] | YAO Y G , WANG X , MENG X J ,et al. ISEK:an information security knowledge graph for CISP knowledge system[C]// The International Conference on IT Convergence and Security (ICITCS). 2015. |
[33] | YAO Y G , ZHANG L , YI J ,et al. A framework for big data security analysis and the semantic technology[C]// The International Conference on IT Convergence and Security (ICITCS). 2016. |
[34] | CIAPESSONI E , CIRIO D , KJ?LLE G ,et al. Probabilistic risk-based security assessment of Power systems considering incumbent threats and uncertainties[J]. IEEE Transactions on Smart Grid, 2016,7(6): 2890-2903. |
[35] | 彭勇, 江常青, 谢丰 ,等. 工业控制系统信息安全研究进展[J]. 清华大学学报, 2012,52(10): 1396-1408. |
PONG Y , JIANG C Q , XIE F ,et al. Industrial control system cyber security research[J]. Journal of Tsinghua University, 2012,52(10): 1396-1408. | |
[36] | KAYNAR K , SIVRIKAYA F . Distributed attack graph generation[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(5): 519-532. |
[37] | YELIZAROV A , GAMAYUNOV D . Visualization of complex attacks and state of attacked network[C]// IEEE Workshop on Visualization for Computer Security (VizSec). 2009. |
[38] | WANG T B , XIA C H , WEN S ,et al. SADI:A novel model to study the propagation of social worms in hierarchical networks[J]. IEEE Transactions on Dependable and Secure Computing, 2015,99: 1-17. |
[39] | STANGE J , D?RK M , LANDSTORFER J ,et al. Visual filter:graphical exploration of network security log files[C]// IEEE Symposium on Visualization for Cyber Security (VizSec). 2014. |
[40] | ZHAO Y , LIANG X , FAN X P ,et al. MVSec:multi-perspective and deductive visual analytics on heterogeneous network security data[J]. Journal of Visualization, 2014,17(3): 181-196. |
[41] | 赵颖, 王权, 黄叶子 ,等. 多视图合作的网络流量时序数据可视分析[J]. 软件学报, 2016,27(5): 1188-1198. |
ZHAO Y , WANG Q , HUANG Y Z ,et al. Collaborative visual analytics for network traffic time-series data with multiple views[J]. Journal of Software, 2016,27(5): 1188-1198. | |
[42] | ZHOU F F , HUANG W , ZHAO Y ,et al. ENTVis:a visual analytic tool for entropy-based network traffic anomaly detection[J]. IEEE Computer Graphics and Applications, 2015,35(6): 42-50. |
[43] | SHI L , WANG C , WEN Z ,et al. 1.5D Egocentric dynamic network visualization[J]. IEEE Transactions on Visualization and Computer Graphics, 2015,21(5): 624-637. |
[44] | LANEY D . Information economics,big data and the art of the possible with analytics[EB/OL]. . |
[45] | CORREA C D , CRNOVRSANIN T , MA K . Visual reasoning about social networks using centrality sensitivity[J]. IEEE Transactions on Visualization and Computer Graphics, 2012,18(1): 106-120. |
[46] | ARIETTA S M , EFROS A A , RAMAMOORTHI R ,et al. City forensics:using visual elements to predict non-visual city attributes[J]. IEEE Transactions on Visualization and Computer Graphics, 2016,20(12): 2624-2633. |
[47] | WANG F , CHEN W , WU F R ,et al. A visual reasoning approach for data-driven transport assessment on urban roads[C]// IEEE Conference on Visual Analytics Science and Technology (VAST). 2014. |
[48] | CAO N , SHI C L , LIN S ,et al. TargetVue:visual analysis of anomalous user behaviors in online communication systems[J]. IEEE Transactions on Visualization and Computer Graphics, 2016,22(1): 280-289. |
[49] | SAKET B , KIM H , BROWN E T ,et al. Visualization by demonstration:an interaction paradigm for visual data exploration[J]. IEEE Transactions on Visualization and Computer Graphics, 2017,23(1): 331-340. |
[1] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[2] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[3] | Xiaochen SHEN, Yinhui GE, Bo CHEN, Ling YU. Research on construction technology of artificial intelligence security knowledge graph [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 164-174. |
[4] | Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE. Survey on explainable knowledge graph reasoning methods [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 1-25. |
[5] | Nan WEI, Lihua YIN, Hong NING, Binxing FANG. Preliminary study on the reform of machine learning teaching [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 182-189. |
[6] | Qingyin TAN, Yingming ZENG, Ye HAN, Yijing LIU, Zheli LIU. Survey on backdoor attacks targeted on neural network [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 46-58. |
[7] | Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN. Survey of artificial intelligence data security and privacy protection [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 1-10. |
[8] | Gang XIONG,Yuwei GE,Yanjie CHU,Weiquan CAO. Model of cyberspace threat early warning based on cross-domain and collaboration [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 88-96. |
[9] | Chao WANG,Yun-jiang WANG,Feng HU. Shaping the future of commercial quantum computer and the challenge for information security [J]. Chinese Journal of Network and Information Security, 2016, 2(3): 17-27. |
[10] | Jian-hua LI. Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space [J]. Chinese Journal of Network and Information Security, 2016, 2(2): 16-29. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|