A survey of network anomaly visualization  被引量:3

A survey of network anomaly visualization

在线阅读下载全文

作  者:Tianye ZHANG Xumeng WANG Zongzhuang LI Fangzhou GUO Yuxin MA Wei CHEN 

机构地区:[1]State Key Laboratory of CAD & CG, Zhejiang University, Hangzhou 310058, China

出  处:《Science China(Information Sciences)》2017年第12期122-138,共17页中国科学(信息科学)(英文版)

基  金:supported by National Basic Research Program of China(973 Program)(Grant No.2015CB352503);Major Program of National Natural Science Foundation of China(Grant No.61232012);National Natural Science Foundation of China(Grant Nos.61422211,u1536118,u1536119);Zhejiang Provincial Natural Science Foundation of China(Grant No.LR13F020001);Fundamental Research Funds for the Central Universities

摘  要:Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed to enhance the ability of network security analysts in understanding the original data, ultimately solving network security problems. This paper surveys current progress and trends in network anomaly visualization. By providing an overview of network anomaly data, visualization tasks, and applications, we further elaborate on existing methods to depict various data features of network alerts, anomalous traffic, and attack patterns data. Directions for future studies are outlined at the end of this paper.Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed to enhance the ability of network security analysts in understanding the original data, ultimately solving network security problems. This paper surveys current progress and trends in network anomaly visualization. By providing an overview of network anomaly data, visualization tasks, and applications, we further elaborate on existing methods to depict various data features of network alerts, anomalous traffic, and attack patterns data. Directions for future studies are outlined at the end of this paper.

关 键 词:network anomaly network anomaly visualization visual analysis network security visualization 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象