Skip to main content

Advertisement

Log in

Visual analysis framework for network abnormal data based on multi-agent model

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

With the development of Internet, the amount of data increases exponentially. With the development of network technology, human beings have entered the era of big data. Therefore, it is very important to find valuable information from massive network data. At present, most of the network security products in the market record the system test results in the form of logs. Users can view and analyze the log information one by one to find out the suspicious behavior and carry out the next diagnosis. Finally, they can defend the identified attacks. Intrusion detection system usually stores detection results in the form of alert files. There may be a large number of redundant or false alarm information in the alarm file, so the heavy cognitive burden of users has become one of the disadvantages of traditional intrusion detection system. In consideration of the above situation, visualization technology has been introduced into the field of network security by researchers. The network visualization analysis displays the massive network data and log information in the way of graph and image, and uses the developed human vision to process the massive graphical data. Data visualization is a method of transforming abstract symbols into concrete geometric figures, which presents the results of simulation and calculation in the form of figures and images. In this paper, multi-agent model is used to build a network data visualization analysis model. The experimental results show that the method in this paper can effectively visualize a large number of network data, and the experimental results are easy to understand.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  • Bañgate J, Dugdale J, Beck E, Adam C (2017) SOLACE a multi-agent model of human behaviour driven by social attachment during seismic crisis. In: 2017 4th international conference on information and communication technologies for disaster management (ICT-DM). IEEE, pp 1–9

  • Chaiken R, Jenkins B, Larson PA et al (2008) SCOPE: easy and efficient parallel processing of massive data sets. PVLDB 1(2):1265–1276

    Google Scholar 

  • Chen X, Wang HH, Tian B (2019) Visualization model of big data based on self-organizing feature map neural network and graphic theory for smart cities. Cluster Comput 22(6):13293–13305

    Article  Google Scholar 

  • China Internet Information Center (2017) 2016 China Internet development statistics report

  • Deng C, Li Z, Gao X, Tao D (2019) Deep multi-scale discriminative networks for double JPEG compression forensics. ACM Trans Intell Syst Technol (TIST) 10(2):1–20

    Article  Google Scholar 

  • Di Stefano L, Lang F, Serwe W (2020) Combining SLiVER with CADP to analyze multi-agent systems. In: International conference on coordination languages and models. Springer, Cham, pp 370–385

  • Doctorow C (2008) Big data: welcome to the petacenter. Nature 455(7209):16–21. https://doi.org/10.1038/455016a

    Article  Google Scholar 

  • Fallahseghrouchni AE (2004) Learning in BDI multi-agent systems. Lect Notes Comput Sci 3259:39–44

    Google Scholar 

  • Fanti G, Jiao J, Makkuva A, Oh S, Rana R, Viswanath P (2019) Barracuda: the power of ℓ-polling in proof-of-stake blockchains. In: Proceedings of the twentieth ACM international symposium on mobile ad hoc networking and computing, pp 351–360

  • Gao X, Ou J, Guo S, Ji W, Li X, Deng C, Hao Q, Guo Z (2020) Sedimentary history of the coastal plain of the south Yellow Sea since 5.1 Ma constrained by high-resolution magnetostratigraphy of onshore borehole core GZK01. Quatern Sci Rev 239:106355

    Article  Google Scholar 

  • Guo F (2016) Study on evacuation model of public places based on multi-agent

  • Guo Y, Rao J, Cheng D et al (2017) Shuffle: improving hadoop performance with shuffle-on-write. IEEE Trans Parallel Distrib Syst 28(6):1649–1662

    Article  Google Scholar 

  • Hao Y, Wang N, Li J, Gao X (2019) HSME: Hypersphere manifold embedding for visible thermal person re-identification. In: Proceedings of the AAAI conference on artificial intelligence, vol 33, pp 8385–8392

  • Harrison L, Prigent N, Engle S et al (2015) Ensemble visualization for cyber situation awareness of network security data. In: 2015 IEEE symposium on visualization for cyber security (Viz Sec). IEEE Computer Society, USA, pp 12–21

  • Hongtao X, Yuanyuan Y, Lincheng S (2001) Review of multi-agent system architecture and coordination mechanism. Robotics 23(1):85–90

    Google Scholar 

  • Hou W, Fu M, Zhang H, Wu Z (2017) Consensus conditions for general second-order multi-agent systems with communication delay. Automatica 75:293–298

    Article  MathSciNet  Google Scholar 

  • Hu G (2012) Research and implementation of network security log data visual analysis system. Beijing University of posts and telecommunications

  • Jinkun L, Lianjie E (2001) A review of the application of multi-agent technology. Control Decis 16(2):133–140

    Google Scholar 

  • Lakkaraju K, Yurcik W, Lee AJ (2004) NVision IP: netflow visualizations of system state for security situational awareness. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security. ACM, pp 65–72

  • Le Malécot E, Kohara M, Hori Y, et al (2006) Interactively combining 2D and 3D visualization for network traffic monitoring. In: Proceedings of the 3rd international workshop on visualization for computer security. ACM, pp 123–127

  • Lei R, Yi D et al (2014) Overview of big data visual analysis. J Softw 09:1909–1936

    Google Scholar 

  • Lugmayr A, Danelljan M, Timofte R, Fritsche M, Gu S, Purohit K, Kandula P, Suin M, Rajagoapalan AN, Joon NH, Won YS (2019). Aim 2019 challenge on real-world image super-resolution: methods and results. In: 2019 IEEE/CVF international conference on computer vision workshop (ICCVW). IEEE, pp 3575–3583

  • Medeiros I, Neves N, Correia M (2016) Detecting and removing web application vulnerabilities with static analysis and data mining. IEEE Trans Reliab 65(1):54–69

    Article  Google Scholar 

  • Pavlichin DS, Jiao J, Weissman T (2019) Approximate profile maximum likelihood. J Mach Learn Res 20(122):1–55

    MathSciNet  MATH  Google Scholar 

  • Que S, Awuah-Offei K, Demirel A, Wang L, Demirel N, Chen Y (2019) Comparative study of factors affecting public acceptance of mining projects: evidence from USA, China and Turkey. J Clean Prod 237:117634

    Article  Google Scholar 

  • Ren L (2009) Research on interaction techniques in information visualization. Ph.D. Thesis, The Chinese Academy of Sciences, Beijing (in Chinese with English abstract)

  • Yingying S, Lianjuan H, Jianan W, Huimin W (2019) Quantum-behaved RS-PSO-LSSVM method for quality prediction in parts production processes. Concurr Comput Pract Exp 9:e5522

    Google Scholar 

  • Zhang HT, Liu B, Cheng Z, Chen G (2016) Model predictive flocking control of the Cucker–Smale multi-agent model with input constraints. IEEE Trans Circuits Syst I Regul Pap 63(8):1265–1275

    Article  MathSciNet  Google Scholar 

  • Zheng J, Ma Q, Yang S, Wang S, Liang Y, Ma J (2020) Research on cooperative operation of air combat based on multi-agent. In: International conference on human interaction and emerging technologies. Springer, Cham, pp 175–179

  • Zhou N (2007) Research on the application of information visualization technology in port scanning and detection. Tianjin University

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuo Li.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by V. Loia.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Z. Visual analysis framework for network abnormal data based on multi-agent model. Soft Comput 25, 1833–1845 (2021). https://doi.org/10.1007/s00500-020-05257-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-020-05257-0

Keywords

Navigation