期刊文献+

大数据与安全可视化 被引量:8

Big data and security visualization
下载PDF
导出
摘要 IT技术的飞速发展开启了大数据时代。海量的数据信息带来更多的数据价值的同时,各类安全问题也随之而来。通过数据可视化技术能够帮助充分全面并且及时地找出系统中可能存在的安全威胁,评估系统安全,保证基础设施的安全。研究从数据角度出发,结合大数据的特征对安全数据进行分类,并对当前已存在的针对不同安全数据进行可视化的工具及技术进行总结,使得能够将已成熟的数据安全可视化技术用于大数据安全的研究,最后对未来的发展趋势进行了展望。 The rapid development of IT technology opens an unprecedented age of big data.The massive amounts of information gives us more data.Meanwhile,all kinds of security problems follow.Data visualization techniques can help us to identify the possible security threats in the system roundly and timely,evaluate system security and ensure the security of infrastructure.In this paper,we first classified security data according to the feature of big data from data perspective;then,summarized the existing visualization tools and technology based on all types of security data so that we can use mature data security visualization technology for the researches of big data security;at last we outlined guidelines and directions for future studies.
出处 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第2期71-81,共11页 Journal of Chongqing University
基金 国家自然科学基金资助项目(61472054) 中央高校基本科研业务费资助项目(106112014CDJZR098801)~~
关键词 大数据 安全可视化 安全数据 big data security visualization security data
  • 相关文献

参考文献60

  • 1Cox M, Ellsworth D. Application-controlled demand paging for out-of-core visualization[C]//Proceedings of the 8th conference on Visualization'97, October19-24,1997, Phoenix, AZ, USA:IEEE Computer Society Press,1997:235-244. 被引量:1
  • 2Doug Laney. Application delivery strategies[M]. USA:META Group Inc,2011. 被引量:1
  • 3Manyika J, Chui M, Brown B, et al. Big data:The next frontier for innovation, competition, and productivity[J]. McKinsey Global Institute,2011. 被引量:1
  • 4Gartner Group Homepage.[EB/OL].[2015-03-26].http://www.gartner,com/.2016. 被引量:1
  • 5Mayer-Sch nberger V, Cukier K. Big data:A revolution that will transform how we live, work, and think[M]. USA:John Munay Publishers,2013. 被引量:1
  • 6Buneman P. Semistructured data[C]//Proceedings of the sixteenth ACM Sigact-sigmod-sigart Symposium on Principles of Database Systems. USA:Association for Computing Machinery,1997:117-121. 被引量:1
  • 7Measuring Cyber Security and Information Assurance:A State-of-the Art Report[M]. USA:Information Assurance Technology Analysis Center,2009. 被引量:1
  • 8Shiravi H, Shiravi A, Ghorbani A. A survey of visualization systems for network security[J]. IEEE transactions on visualization and computer graphics,2012,18(8):1313-1329. 被引量:1
  • 9Fortier S C, Shombert L A. Network profiling and data visualization[C]//Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, USA:IEEE, 2000. 被引量:1
  • 10Richard A, Becker S G E, Allan R. Wilks, Visualizing network data[J]. IEEE Transactions on Visualization and Computer Graphics,1995,1(1):16-28. 被引量:1

二级参考文献89

  • 1徐林,张德运,孙钦东,张晓彤.基于NAPI的数据包捕获技术研究[J].计算机工程与应用,2004,40(26):138-139. 被引量:8
  • 2齐德昱,钱正平.CLS:一种支持状态图复用的攻击场景描述语言[J].计算机科学,2006,33(11):69-73. 被引量:3
  • 3McCORMICK B H, DEFANTI T A, BROWN M D. Visualization in scientific computing[J]. Computer Graphics, 1987, 21 (6) : 153-156. 被引量:1
  • 4CARD S K, MACKINLAY J D, SHNIDERMAN B. Readings in information visualization: using vision to think[M]. San Fransisco: Morgan Kaufmann Publishers, 1999 被引量:1
  • 5BECKER R A, EICK S G, WILKS A R. Visualizing network data [J]. IEEE Transactions on Visualization and Computer Graphics, 1995, 1(1):16-28 被引量:1
  • 6FORTIER S C, SHOMBERT L A. Network profiling and data visualization[ C]// Proceedings of the 2000 IEEE Workshop on Information Assurance and Security. West Point, NY: IEEE, 2000:166 - 169. 被引量:1
  • 7GIRARDIN L , BRODBECK D . A visual approach for monitoring logs[ EB/OL]. [ 2008 - 07 - 23 ]. http://www. ubilab, org/publications/print versions/pdf/gir98, pdf. 被引量:1
  • 8ERBACHER R F, FRINCKE D. Visualization in detection of intrusions and misuse in large-scale networks[ C]// Information Visualization 2000. Washington DC: IEEE CS Press, 2000:294 -299. 被引量:1
  • 9ERBACHER R F. Visual behaviour characterization for intrusion detection in large scale systems[ EB/OL]. [ 2007 - 08 - 23]. http:// www. cs. albany, edu/-erbacher/publications/SecurityVisPaper2 - VIIP01 color, pdf. 被引量:1
  • 10刘戡.多维数据可视化研究[D].武汉:武汉大学,2002. 被引量:1

共引文献84

同被引文献89

引证文献8

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部