参考文献 [1] 中国互联网络信息中心. 2011年中国网络信息中心年度报告[Z]. 2012. [2] 国家互联网应急中心. 2011年我国互联网网络安全态势综述[Z]. 2012. [3] Becker R A, Eick S G, Wilks A. Visualizing Network Data[J]. IEEE Transactions on Visualization and Computer Graphic, 1995, 1(1):16-28. [4] Fortier S C, Shombert L, Network Profiling and Data Visualiz- ation[C]//Proceedings of the 2000 IEEE Workshop on Information Assurance and Security. [S. 1.]: IEEE Press, 2000: 166-169. [5] 吕良福, 张加万, 孙济洲. 网络安全可视化研究综述[J]. 计算机应用, 2008, 28(8): 1924-1927. [6] 穆成坡, 黄厚宽, 田盛丰. 入侵检测系统报警信息聚合与关联技术研究综述[J]. 计算机研究与发展, 2006, 43(1): 1-8. [7] Koike H, Ohno K. SnortView: Visualization System of Snort Logs[C]//Proceedings of ACM Workshop on Visualization and Data Mining for Computer Security. [S. 1.]: ACM Press, 2004: 143-147. [8] Koike H, Ohno K, Koizumi K. Visualizing Cyber Attacks Using IP Matrix[C]//Proceedings of VizSEC’05. [S. 1.]: IEEE Press, 2005: 91-98. [9] Abdullah K, Lee C, Conti G. IDS Rainstorm: Visualizing IDS Alarms[C]//Proceedings of VizSEC’05. [S. 1.]: IEEE Press, 2005: 1-10. [10] Livnat Y, Agutter J, Moon S. A Visualization Paradigm for Network Intrusion Detection[C]//Proceedings of 2005 IEEE Workshop on Information Assurance And Security. [S. 1.]: IEEE Press, 2005: 92-99. [11] Shiravi H, Shirav A, Ghorbani A. IDS Alert Visualization and Monitoring Through Heuristic Host Selection[C]// Proceedings of the 12th International Conference on Information and Communications Security. Barcelona, Spain: IEEE Press, 2010: 445-458. [12] Zhao Ying, Zhou Fangang, Fan Xiaoping. IDSRadar: a Real-time Visualization Framework for IDS Alerts[J]. Science China Information Sciences, 2013, 56(8): 1-12. [13] Xi Rongrong, Yun Xiaochun, Jin Shuyuan. Research Survey of Network Security Situation Awareness[J]. Journal of Computer Applications, 2012, 32(1):1-4. 编辑 索书志 |