网络安全态势感知可视化分析

Yuanfa Zhang, Jingjing Zhang, Bing Zhang
{"title":"网络安全态势感知可视化分析","authors":"Yuanfa Zhang, Jingjing Zhang, Bing Zhang","doi":"10.1109/ICSESS47205.2019.9040716","DOIUrl":null,"url":null,"abstract":"In response to the anti-terrorism needs of networks, this article visually analyzes the network topology and visualizes the network structure features. It not only displays the overall structure of the network through rich visualization methods, but also combines interactive analysis tools. Hidden structural features and connection modes of the expression network are explored, reflecting the process of network security analysts analyzing and inferring, obtaining key nodes and weak links in the network structure, identifying potential vulnerabilities and attacks, and being able to perform quick identify responses for efficient cybersecurity situational awareness.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Visual Analysis of Cybersecurity Situational Awareness\",\"authors\":\"Yuanfa Zhang, Jingjing Zhang, Bing Zhang\",\"doi\":\"10.1109/ICSESS47205.2019.9040716\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In response to the anti-terrorism needs of networks, this article visually analyzes the network topology and visualizes the network structure features. It not only displays the overall structure of the network through rich visualization methods, but also combines interactive analysis tools. Hidden structural features and connection modes of the expression network are explored, reflecting the process of network security analysts analyzing and inferring, obtaining key nodes and weak links in the network structure, identifying potential vulnerabilities and attacks, and being able to perform quick identify responses for efficient cybersecurity situational awareness.\",\"PeriodicalId\":203944,\"journal\":{\"name\":\"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSESS47205.2019.9040716\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS47205.2019.9040716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

针对网络的反恐需求,本文对网络拓扑进行可视化分析,将网络结构特征可视化。它不仅通过丰富的可视化方法显示网络的整体结构,而且结合了交互式分析工具。探索表达网络隐藏的结构特征和连接方式,体现网络安全分析人员通过分析推断,获取网络结构中的关键节点和薄弱环节,识别潜在漏洞和攻击,快速识别响应的过程,实现高效的网络安全态势感知。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Visual Analysis of Cybersecurity Situational Awareness
In response to the anti-terrorism needs of networks, this article visually analyzes the network topology and visualizes the network structure features. It not only displays the overall structure of the network through rich visualization methods, but also combines interactive analysis tools. Hidden structural features and connection modes of the expression network are explored, reflecting the process of network security analysts analyzing and inferring, obtaining key nodes and weak links in the network structure, identifying potential vulnerabilities and attacks, and being able to perform quick identify responses for efficient cybersecurity situational awareness.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信