计算机科学与探索 ›› 2014, Vol. 8 ›› Issue (7): 848-857.DOI: 10.3778/j.issn.1673-9418.1312039

• 网络与信息安全 • 上一篇    下一篇

大规模网络安全数据协同可视分析方法研究

赵  颖1,樊晓平1,2,周芳芳1+,黄  伟3,汤梦姣3   

  1. 1. 中南大学 信息科学与工程学院,长沙 410083
    2. 湖南财政经济学院 网络化系统研究所,长沙 410205
    3. 中南大学 软件学院,长沙 410075
  • 出版日期:2014-07-01 发布日期:2014-07-02

Research on Collaborative Visual Analysis of Large Scale Network Security Data

ZHAO Ying1, FAN Xiaoping1,2, ZHOU Fangfang1+, HUANG Wei3, TANG Mengjiao3   

  1. 1. School of Information Science and Engineering, Central South University, Changsha 410083, China
    2. Laboratory of Networked Systems, Hunan University of Finance & Economics, Changsha 410205, China
    3. School of Software, Central South University, Changsha 410075, China
  • Online:2014-07-01 Published:2014-07-02

摘要: 网络安全可视化是近年来网络安全研究的热点,它通过提供有效的信息可视化工具,提升网络安全分析师在解决网络安全问题过程中的感知和认知能力,从而发现模式、识别异常和掌握趋势。为了应对大规模、多数据源的网络安全协同可视分析需求,研究了基于统一格式的事件元组和统计元组的数据融合模型,并提出了擅长事件关联分析的雷达图和擅长统计时序对比分析的对比堆叠流图的设计方法。最后使用该原型系统对2013国际可视分析挑战赛(visual analytics science and technology challenge,VAST Challenge)中网络安全数据可视分析竞赛提供的数据集进行了分析,通过实验和讨论验证了该网络安全数据协同可视分析方法的有效性。

关键词: 信息可视化, 可视分析, 网络安全, 数据融合, 堆叠流图, 雷达图

Abstract: Network security visualization is a growing community of network security research in recent years. It provides the human security analysts with better tools to discover patterns, detect anomalies, identify correlations of security events with higher efficiency. To meet the demand of cooperative visual analytics on large-scale network and multi-source data, this paper develops a data fusion model based on the even tuple and statistics tuple within uniform data formats, raises a design strategy including the radial graph that is good at parsing events correlations and comparative stacked stream that is good at comparing statistics time series, explores the automated deployment method based on network logic topology and edge bundling method in radial graph. Finally by utilizing the proposed prototype system to analyze network security datasets in VAST Challenge 2013 and conducting some experiments and discussions, the effectiveness of tools is verified and substantiated.

Key words: information visualization, visual analytics, network security, data fusion, stacked stream graph, radial graph