Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (2): 40-54.doi: 10.11959/j.issn.2096-109x.2018015

• Security data visualization • Previous Articles     Next Articles

System detecting network anomaly with visualization techniques

Haocheng ZHANG,Xiaojie WU,Xiang TANG,Runxuan SHU,Tianchen DING,Xiaoju DONG   

  1. School of Electronic Information and Electrical Engineering,Shanghai Jiaotong University,Shanghai 200240,China
  • Revised:2018-01-30 Online:2018-02-01 Published:2018-03-08
  • Supported by:
    TheNational Nature Science Foundation of China(61472238);TheNational Nature Science Foundation of China(61772336);TheNational Nature Science Foundation of China(61572318)

Abstract:

With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.

Key words: information visualization, network security visualization, visualization system, interaction

CLC Number: 

No Suggested Reading articles found!