检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Tianye ZHANG Xumeng WANG Zongzhuang LI Fangzhou GUO Yuxin MA Wei CHEN
机构地区:[1]State Key Laboratory of CAD & CG, Zhejiang University, Hangzhou 310058, China
出 处:《Science China(Information Sciences)》2017年第12期122-138,共17页中国科学(信息科学)(英文版)
基 金:supported by National Basic Research Program of China(973 Program)(Grant No.2015CB352503);Major Program of National Natural Science Foundation of China(Grant No.61232012);National Natural Science Foundation of China(Grant Nos.61422211,u1536118,u1536119);Zhejiang Provincial Natural Science Foundation of China(Grant No.LR13F020001);Fundamental Research Funds for the Central Universities
摘 要:Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed to enhance the ability of network security analysts in understanding the original data, ultimately solving network security problems. This paper surveys current progress and trends in network anomaly visualization. By providing an overview of network anomaly data, visualization tasks, and applications, we further elaborate on existing methods to depict various data features of network alerts, anomalous traffic, and attack patterns data. Directions for future studies are outlined at the end of this paper.Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed to enhance the ability of network security analysts in understanding the original data, ultimately solving network security problems. This paper surveys current progress and trends in network anomaly visualization. By providing an overview of network anomaly data, visualization tasks, and applications, we further elaborate on existing methods to depict various data features of network alerts, anomalous traffic, and attack patterns data. Directions for future studies are outlined at the end of this paper.
关 键 词:network anomaly network anomaly visualization visual analysis network security visualization
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.117