期刊文献+

一种实时网络风险可视化技术研究及实现

The Research and Implementation of a Real-Time Network Risk Visualization Technology
下载PDF
导出
摘要 现今网络恶意行为呈爆炸性增长,而传统的基于文本及简单图表的网络入侵检测系统在面对海量网络数据时存在认知负担过重以及呈现不及时的问题.基于入侵检测的实时网络风险可视化技术则可以将海量数据以图形图像的方式实时动态直观地表现出来,通过在人和网络威胁流量之间建立实时的图像通信,可以使人能够及时理解并发现当前的网络安全态势,以便于快速管理及控制当前网络安全状况. Today, the network malicious behavior goes into the explosive growth. And the traditional text based or simple chart based network intrusion detection systems are hard to use in the face of massive network data. Intrusion-detection-based real-time network risk visualization technology can transfer massive data to graphics and images dynamically in time. Then, we can build real-time imaged communication between human and cyber threat flow. So that we can quickly understand and figure out the current cyber security trend. That can be a good convenience for people to manage and control current cyber security.
作者 王琳 胡晓勤
出处 《信息安全研究》 2016年第2期180-185,共6页 Journal of Information Security Research
基金 国家自然科学基金项目(61173159 61572334)
关键词 风险评估 网络风险可视化 实时可视化 人工免疫算法 网络安全 risk evaluation cyber risk visualization real-time visualization artificial immune algorithm cyber security
  • 相关文献

参考文献8

二级参考文献73

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2张义荣,鲜明,王国玉.一种基于网络熵的计算机网络攻击效果定量评估方法[J].通信学报,2004,25(11):158-165. 被引量:55
  • 3穆成坡,黄厚宽,田盛丰.基于模糊认知图的自动入侵响应决策推理机制[J].北京交通大学学报,2005,29(2):12-16. 被引量:3
  • 4赖积保,王慧强,金爽.基于Netflow的网络安全态势感知系统研究[J].计算机应用研究,2007,24(8):167-169. 被引量:21
  • 5RITCHEY R, AMMANN P. Using model checking to analyze network vulnerabilities [ C ]//Proceedings of the IEEE Symp on Security and Privacy. Berkeley: IEEE Computer Society Press, 2000 : 156 - 165. 被引量:1
  • 6ZOU C C, TOWSLEY D, GONG Weibo. Modeling and simulation study of the propagation and defense of internet E-mail worms [ J ]. IEEE Transactions on dependable and Secure Computing, 2007, 4(2) :115 - 120. 被引量:1
  • 7CLARK K, TYREE S, DAWKINS ], et al. Qualitative and quantitative analytical techniques for network security assessment [ C ]//Proceedings of the 2004 IEEE Workshop on Information Assurance and Security. NY: IEEE Computer Society Aress, 2004 : 10 - 11. 被引量:1
  • 8CARDOSO R C, FREIRE M M. Intelligent assessment of distributed security in TCP/IP networks [C]//Proceedings of 7th IEEE International Conference on High Speed Networks and Multimedia Communications. LNCS, Toulouse : Spinger-verlay, 2004 : 1092 - 1099. 被引量:1
  • 9LAKHINA A, CROVELLA M, DIOT C. Mining anomalies using traffic feature distributions [ C ]//Proceedings of the ACM SIGCOMM. NY: ACM Press, 2005:225 - 231. 被引量:1
  • 10JAJODIA S, NOEL S, O' BERRY B. Managing Cyber Threats : Approaches and Challenges [ M ]. NY : Spring er-Verlag, 2005:247 -266. 被引量:1

共引文献86

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部