引用本文
  • 袁斌,邹德清,金海.网络安全可视化综述[J].信息安全学报,2016,1(3):10-20    [点击复制]
  • YUAN Bin,ZOU Deqing,JIN Hai.Network Security Visualization: A Survey[J].Journal of Cyber Security,2016,1(3):10-20   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

←前一篇|后一篇→

过刊浏览    高级检索

本文已被:浏览 10605次   下载 20156 本文二维码信息
码上扫一扫!
网络安全可视化综述
袁斌, 邹德清, 金海
0
(华中科技大学 服务计算技术与系统教育部重点实验室 集群与网格计算湖北省重点实验室 武汉 中国 430074)
摘要:
随着互联网技术的发展,网络渗入到人们生活的方方面面。一方面,电子商务、社交网络、线上娱乐、信息化办公等各种网络应用为人们的生活带来了诸多便利;另一方面,网络与人们生活的不可分割性为网络攻击和网络犯罪提供了可乘之机。攻击者通过各种各样的网络攻击获取他人隐私,牟取非法利益。近年来,网络攻击的数量越来越多,攻击的规模越来越大,攻击的复杂度也越来越高。因此,网络安全比以往任何时期都显得重要。然而传统的网络安全保障机制,如入侵检测,防御系统,网络防火墙等,因其智能性、动态性、全局性等的缺乏,都不足以应对越发复杂和高强度的网络攻击。因此,网络安全可视化应运而生,成为近年来网络安全研究的一个热点。与传统网络安全保障机制不同,网络安全可视化技术不仅能有效处理海量网络数据信息,捕获网络的全局态势,而且能通过对图形图像模式的分析帮助网络管理人员快速识别潜在的攻击和异常事件,即时预测安全事件,甚至是发现新的攻击类型。可视化技术为网络安全研究方法带来了变革,优秀的网络安全可视化方案层出不穷。网络安全可视化建立在对网络数据分析的基础之上,网络数据对网络安全分析十分重要,而大数据时代的到来进一步凸显了数据的重要性。因此,本文从数据角度出发,根据所处理的网络数据的类型,对网络安全可视化工作进行系统的整理、分类和对比。此外,本文还深入分析网络安全可视化研究面临的挑战并探讨未来该领域的研究方向。
关键词:  可视化技术  网络安全  安全可视化
DOI:10.19363/j.cnki.cn10-1380/tn.2016.03.002
投稿时间:2016-06-21修订日期:2016-06-29
基金项目:本课题得到973国家重点基础研究发展计划(2014CB340600)资助。
Network Security Visualization: A Survey
YUAN Bin, ZOU Deqing, JIN Hai
(Cluster and Grid Computing Lab, Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, 430074, China)
Abstract:
The developing of Internet techniques has brought many convenience into our daily life, such as on-line shopping, on-line entertainment, social network, etc. However, cyber-attack and cyber-crime have also become more and more common since Internet provides so many potential profits, which makes cyber security more and more important. Unfortunately, traditional cyber security approaches, such as firewall, IDS and IPS, are not efficient because they lack the feature of intelligence, dynamic nature and global view. As such, network security visualization is proposed. Visualization is not only efficient but also very effective at communicating information. Based on the analysis of network data, network security visualization transfers the invisible, unexpressed and abstract network data into visual images to provide a high-level view of security events to analysts for more timely and informed decisions. Visualization brings revolution to the network security research area and has developed very fast. In this paper, we provide a thorough survey of network security visualization, categorizing the related work based on the type of network data (since network data is the basis of network security visualization). Further, we analyze the issues and challenges regarding network security visualization and provide guidelines and directions for future work.
Key words:  visualization techniques  network security  security visualization