首页 | 本学科首页   官方微博 | 高级检索  
     

基于多元异构网络安全数据可视化融合分析方法
引用本文:张胜,施荣华,赵颖.基于多元异构网络安全数据可视化融合分析方法[J].计算机应用,2015,35(5):1379-1384.
作者姓名:张胜  施荣华  赵颖
作者单位:1. 中南大学 信息科学与工程学院, 长沙 410083; 2. 湖南商学院 现代教育技术中心, 长沙 410205
基金项目:国家自然科学基金资助项目
摘    要:随着现代网络安全设备日益丰富,安全日志呈现多元异构趋势.针对日志数据量大、类型丰富、变化快等特点,提出了利用可视化方法来融合网络安全日志,感知网络安全态势.首先,选取了异构安全日志中有代表性的8个维度,分别采用信息熵、加权法、统计法等不同算法进行特征提取;然后,引入树图和符号标志从微观上挖掘网络安全细节,引入时间序列图从宏观展示网络运行趋势;最后,系统归纳图像特征,直观分析攻击模式.通过对VAST Challenge 2013竞赛数据进行分析,实验结果表明, 该方法在帮助网络分析人员感知网络安全态势、识别异常、发现攻击模式、去除误报等方面有较大的优势.

关 键 词:网络安全可视化  多元异构数据  特征提取  树图和符号标志  时间序列图  
收稿时间:2014-12-05
修稿时间:2015-01-12

Visual fusion and analysis for multivariate heterogeneous network security data
ZHANG Sheng,SHI Ronghua,ZHAO Ying.Visual fusion and analysis for multivariate heterogeneous network security data[J].journal of Computer Applications,2015,35(5):1379-1384.
Authors:ZHANG Sheng  SHI Ronghua  ZHAO Ying
Affiliation:1. School of Information Science and Engineering, Central South University, Changsha Hunan 410083, China;
2. Modern Educational Technology Center, Hunan University of Commerce, Changsha Hunan 410205, China
Abstract:With the growing richness of modern network security devices, network security logs show a trend of multiple heterogeneity. In order to solve the problem of large-scale, heterogeneous, rapid changing network logs, a visual method was proposed for fusing network security logs and understanding network security situation. Firstly, according to the eight selected characteristics of heterogeneous security logs, information entropy, weighted method and statistical method were used respectively to pre-process network characteristics. Secondly, treemap and glyph were used to dig into the security details from micro level, and time-series chart was used to show the development trend of the network from macro level. Finally, the system also created graphical features to visually analyze network attack patterns. By analyzing network security datasets from VAST Challenge 2013, the experimental results show substantial advantages of this proposal in understanding network security situation, identifying anomalies, discovering attack patterns and removing false positives, etc.
Keywords:network security visualization  multiple heterogeneous data  feature extraction  treemap and glyph  time-series chart
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号