期刊文献+

三维可视化安全态势感知技术研究

Research of Security Awareness Technology Based on Three Dimensions Visualization
下载PDF
导出
摘要 网络态势可视化技术作为一项新技术,是网络安全态势感知与可视化技术的结合,将网络中蕴涵的态势状况通过可视化图形方式展示给用户,并借助于人在图形图像方面强大的处理能力,实现对网络异常行为的分析和检测。同时还选择安全态势可视化中的一种视图,开展了三维可视化技术的研究,介绍该软件的设计开发流程,并基于OpenGl开发平台对其进行了编码实现。 Visualization of network security situation,which combines technologies in network security situational awareness and that in visualizations,is a new technology used in network security area. With strong abilities in processing pictures of human brain,pictures that contain information of network situation are shown to users in the aim of detecting and analyzing abnormal activities. One view of visualization system,which is in the form of three dimensions,is another problem should be solved in this essay. Designing details are shown and this software is programmed with developing platform of OpenGL.
出处 《大庆师范学院学报》 2010年第6期19-22,共4页 Journal of Daqing Normal University
基金 黑龙江省教育厅科学技术研究项目(11553001)
关键词 网络安全态势 感知技术 三维可视化 network security situation awareness technology three dimensions visualization
  • 相关文献

参考文献13

  • 1Bass T, Gruber D. A glimpse into t he f ut ure of id[ EB/OL]. http ://www. usenix. org/p ublications/login -/1999 -9/features/future. html. 被引量:1
  • 2Bass T. Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Sit - uational Awareness [ J ]. Communications of t he ACM,2000,43(4) :99 - 105. 被引量:1
  • 3Batsell S G,Rao N S, Shankar M. Distributed Int rusion Detection and Attack Containment for Organizational Cyber Security [ EB/OL ]. http:// www. ioc. ornl. gov/p rojects/documents/containment. pdf,2005. 被引量:1
  • 4Shifflet J. A Technique Independent Fusion Model For Net work Intrusion Detection [ C ]. Proceed - ings of the Midstates Conference on Undergraduate Research in Computer Science and Mat hematics ,2005,3 (1) :13 -19. 被引量:1
  • 5DeMontigny - Leboeuf A, Massicotte F. Passive network discovery for real time situation awareness [ C ]. NA TO/R TO Adaptive Defence in Unclassified Net works, Toulouse, France, April 2004. 被引量:1
  • 6Lau S. The spinning cube of potential doom[J]. Communications of the ACM ,2004,47(6) :25 -26. 被引量:1
  • 7Carnegie Mellon' s SEI. System for Internet Level Knowledge (SILK) [ EB/OL]. http ://silktools. source forge.net ,2005. 被引量:1
  • 8Lakkaraju K,Yurcik W, Lee A J. NVisionlP:NetFlow visualizations of system state for Security situational awareness[ C ]. In:P- rocee -dings of the2004 ACM Workshop onVisualization and Data Mining for Computer Security, Washington, DC ,2004:65 - 72. 被引量:1
  • 9Yin Xiaoxin, Yurcik William, Treaster Michael. VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness [ C ]. In : proceedings of the2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington. DC,2004:26 - 34. 被引量:1
  • 10张文修等编著..粗糙集理论与方法[M].北京:科学出版社,2001:224.

二级参考文献11

  • 1DENNING D. An intrusion detection model[J]. IEEE Transactions on Software Engineering, 1987,13(2): 222-232. 被引量:1
  • 2HUANG M Y. WICKS T M. A large-scale distributed intrusion detection framework based on attack strategy analysis[A]. Web Proceedings of the First International Workshop on Recent Advances in Intrusion Detection (RAID'98)[C]. 1998.201-210. 被引量:1
  • 3DEBAR H, WESPI A. Aggregation and Correlation ofIntrusion-Detection Alerts[A]. Fourth International Symposium on Recent Advance in Intrusion erection[C]. 2001.85-103. 被引量:1
  • 4PENG N, YUN C, DOUGLAS S R. Analyzing intensive intrusion alerts via correlation[A]. Fifth International Symposium on Recent Advance in Intrusion Detection[C]. 2002.74-95. 被引量:1
  • 5DAIN O M, CUNNINGHAM R K. Building scenarios from a heterogeneous alert stream[A]. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security[C]. United States Military Academy, West Point, NY, 2001.5-6. 被引量:1
  • 6VALDES A, SKINNER K. Probabilistic Alert correlation[A]. Fourth International Symposium on Recent Advance in Intrusion Detection[C]. 2001.54-69. 被引量:1
  • 7REID D B. An algorithm for tracking multiple targets[J]. IEEE Transaction on Automatic Control, 1979, 24(6): 178-200. 被引量:1
  • 8CHAM T J, REHG J M. A multiple hypothesis approach to figure tracking[A]. Computer Vision and Pattern Recognition (CVPR 99)[C].Ft Collins, CO, 1999. 239-245. 被引量:1
  • 9ALBEROLA C, CYBENKO G V. Tracking with text-based messages[J]. Intelligent Systems, 1999, 14(4): 70-78. 被引量:1
  • 10The Truth about False Positivs[EB/OL]. http://.www.iss.net. 被引量:1

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部