Please wait a minute...

����Ŀ¼

    15 February 2018, Volume 4 Issue 2
    Security data visualization
    Survey on network topology visualization
    Song WANG, Ye ZHANG, Yadong WU
    2018, 4(2):  1-17.  doi:10.11959/j.issn.2096-109x.2018014
    Asbtract ( 2244 )   HTML ( 44)   PDF (4459KB) ( 5938 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the basis of network monitoring,network management,and network security situation awareness,network topology visualization plays an underlying role in reflecting the whole state of the network and discovering the potential rules in the network topology.The basic content of network topology visualization was introduced and the main challenges in the research of network topology visualization were summarized from two aspects:the internal characteristics of network data and the point of the applied demand angle of the users.A top-down VPI model for network topology visualization and analysis drawing from the experience of domain experts by analyzing and understanding the nodes and connection status of network topology,having an insight into the potential laws of topological information like performance bottleneck,network security,time-varying characteristics and so on.This model includes vision,procedure,and interaction.According to the VPI model,visualization methods based on perception enhance were summarized from three aspects:enhancement of visual perception,enhancement of time-varied procedure and enhancement of exploratory interaction.Finally,future development trend of those topics were discussed combined with application demand.

    Survey on the visualization technologies of threatening security data in cyber space
    Fan ZHANG, Fan XIE, Jie JIANG
    2018, 4(2):  34-39.  doi:10.11959/j.issn.2096-109x.2018013
    Asbtract ( 2343 )   HTML ( 58)   PDF (475KB) ( 5710 )   Knowledge map   
    References | Related Articles | Metrics

    With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.

    System detecting network anomaly with visualization techniques
    Haocheng ZHANG,Xiaojie WU,Xiang TANG,Runxuan SHU,Tianchen DING,Xiaoju DONG
    2018, 4(2):  40-54.  doi:10.11959/j.issn.2096-109x.2018015
    Asbtract ( 1514 )   HTML ( 20)   PDF (2144KB) ( 2242 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.

    ChinaVis Data Challenge from 2015 to 2017
    Ying ZHAO,Zhuo ZHANG,Xiaoru YUAN
    2018, 4(2):  55-61.  doi:10.11959/j.issn.2096-109x.2018012
    Asbtract ( 1365 )   HTML ( 23)   PDF (548KB) ( 2879 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The evolution of the ChinaVis Data Challenge from its origin 2015 to 2017 was presented.Firstly,the background and organization of the Data Challenge were introduced.Then,the competition contents and statistical data of the three years were summarized.Finally,the future development of the Data Challenge was discussed.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: