Font Size: a A A

Research And Implementation Of Visual Analysis Method For Network

Posted on:2019-12-22Degree:MasterType:Thesis
Country:ChinaCandidate:S C L QiaoFull Text:PDF
GTID:2428330566467006Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the information of modern society,the demand for network security is becoming more and more important.For the field of network security,network security visualization has become a hot research direction.Network security visualization technology is a new network security data analysis technology,which combines network security technology and visualization technology.Faced with massive and complex high-dimensional data,network security visualization is favored by network security analysts with the advantages of visual interface,easy finding network anomalies and attacks,and improving user perception.At the same time,many experts and scholars at home and abroad have paid more and more attention to the research of network security visualization.Network traffic data play a very important role in finding network anomalies and attacks.Many researches on network security are based on network traffic data.In this paper,the network security visualization method is used to study and implement the visual analysis method of network security flow data.The main work as follows:(1)By the investigation of the network security visualization technology of the world so far,research and study the typical visualization algorithms and network security visualization methods,and the preprocessing technology for obtaining data is mastered.(2)Put forward a visual analysis index model for network traffic data combining the typical network security data visualization index model.The index model includes the connection number anomaly index set and the traffic anomaly index set,which can visualize the characteristics of abnormal state contained in network security data.The first set of indicators presents the number of TCP connections and the number of UDP connections;the second set of indicators achieves the presentation of 9 feature data.(3)Put forward a visual analysis method based on network traffic data.The visual analysis method contains three stages,and three visual algorithms(compared with stacked flow view,parallel coordinate view,and thermal view)are implemented with cross application.Experiments show that the visual analysis method is effective and can detect anomaly and identify DDOS attacks.
Keywords/Search Tags:network security, visualization, index model, anomaly detection, visual analysis
PDF Full Text Request
Related items