Skip to main content
Log in

An Interactive Visualization System for Network Security Data

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

Abstract

Data visualization is an important approach for data analysis, which can reveal the patterns and characteristics of complex datasets through visual processing, and provide aid for data analysts. In recent years, with the expansion of Internet users and the rich diversity of various Internet applications, the importance of network security is increasing. In the field of network security data analysis, it is a developing direction to use data visualization methods and visual analysis tools to assist manual analysis. In this paper, a visualization system for network security data is designed and implemented, which is mainly based on network flow records and security policies. The node centrality measurement and high-dimensional data visualization methods are comprehensively applied, and an interactive visualization approach is proposed. The IP topology is presented in three different view modes: static analysis, temporal analysis and exploration analysis. In addition, the high-dimensional projection map takes flow, security policy and IP address as analysis objects and selects several dimensional features as indicators. After visual presentation, the distribution of the stream set and IP set contained in the record after projection in the selected dimension space can be obtained, so that the analyst can find the points with significant abnormal eigenvalue distribution, and deduce the possible situation based on this. After testing, the system can accept the new original data record file, and quickly generate the corresponding visualization content, which can be used for the visualization analysis of network security optimization tool software, and has been used in the actual system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

Data Availability

Not Applicable.

References

  1. Qiu, M., Xue, C., Shao, Z., et al. (2006). Efficient algorithm of energy minimization for heterogeneous wireless sensor network. IEEE EUC, 25–34.

  2. Niu, J., Gao, Y., Qiu, M., & Ming, Z. (2012). Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC, 72(12), 1565–1575.

    Google Scholar 

  3. Zhang, Y. L. (2022). Network security data visualization fusion analysis method based on multivariate heterogeneous. Electronic Technology and Software Engineering, (15), 5–8.

  4. Qiu, H., Qiu, M., & Lu, R. (2019). Secure V2X communication network based on intelligent PKI and edge computing. IEEE Network, 34(2), 172–178.

    Article  Google Scholar 

  5. Qiu, H., Zeng, Y., et al. (2021). Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation. ACM Asia Conference on Computer and Communications Security.

  6. Hu, G. (2012). Research and Implementation of Network security log data Visual Analysis System. Beijing University of Posts and Telecommunications.

  7. Tao, L., Golikov, S., Gai, K., & Qiu, M. (2015) A reusable software component for integrated syntax and semantic validation for services computing. IEEE Symposium on Service-Oriented System Engineering, 127–132.

  8. Qiu, M., Zhang, K., & Huang, M. (2006). Usability in mobile interface browsing. Web Intelligence and Agent Systems: An International Journal, 4(1), 43–59.

    Google Scholar 

  9. Zhang, K., Kong, J., Qiu, M., & Song, G. (2005). Multimedia layout adaptation through grammatical specifications. Multimedia Systems, 10(3), 245–260.

    Article  Google Scholar 

  10. Qiu, M., Zhang, K., & Huang, M. (2004) An empirical study of web interface design on small display devices. IEEE/WIC/ACM International Conference on Web Intelligence (WI’04), 29–35.

  11. Yu, X., & Yu, C. (2021). Based on the information environment of the network security data visualization study. Journal of Electronic World, (14), 49–50.

  12. Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics, 18(8), 1313–1329.

    Article  Google Scholar 

  13. Zhao, Y., Fan, X., Zhou, F., Wang, F., & Zhang, J. (2014). A survey on network security data visualization. Journal of Computer Aided Design and Graphics.

  14. Chen, W., Shen, Z. Q., & Tao, Y. B. (2013). Data Visualization. Publishing House of Electronics Industry.

  15. Qi, L., Blaich, A., Vanbruggen, D., & Striegel, A. (2010). Managing networks through context: graph visualization and exploration. Computer Networks, 54(16), 2809–2824.

    Article  Google Scholar 

  16. Li, J., Ming, Z., Qiu, M., Quan, G., Qin, X., & Chen, T. (2011). Resource allocation robustness in multi-core embedded systems with inaccurate information. Journal of Systems Architecture, 57(9), 840–849.

    Article  Google Scholar 

  17. Hu, F., Lakdawala, S., Hao, Q., & Qiu, M. (2009). Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Transactions on Information Technology in Biomedicine, 13(4), 656–663.

  18. Zhao, Y., Liang, X., Fan, X., Wang, Y., Yang, M., & Zhou, F. (2014). Mvsec. Journal of Visualization.

  19. Hernan Li D. Y., & Gan, W. Y. (2007). Overview of Importance Node Mining in Complex Networks. Computer Science, 34(12), 1–5.

  20. Rong, L. L., Guo, T. Z., & Wang, J. W. (2008). Centralities of nodes in complex networks. Journal of University of Shanghai for Science and Technology.

  21. Wang, R. S. (2016). Research on Spatiotemporal Multi-dimensional data visualization in big Data environment. Zhejiang University.

  22. Kandogan, E. (2001). Visualizing multi-dimensional clusters, trends, and outliers using star coordinates. Acm Sigkdd International Conference on Knowledge Discovery and data Mining (pp.107-116). DBLP.

  23. Shui, C., Cheng, T., & Li, Hui. (2015). A survey of Network Graph Automatic Layout Algorithms Based on Force-directed Model. Computer Engineering and Science, 37(3), 457–465.

    Google Scholar 

  24. Zhao, L. H. (2009). Research and Implementation of Large-scale Network Topology Visualization Tool. Heilongjiang University.

  25. Haviv, A. Q. (2014). Mean web development.

Download references

Acknowledgements

The authors gratefully acknowledge the anonymous reviewers for their helpful suggestions.

Funding

The authors did not receive support from any organization for the submitted work. The authors declare they have no financial interests.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Zheng.

Ethics declarations

Conflicts of Interest

The authors declare that they have no competing interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zheng, L., Yu, G. & Zheng, Y. An Interactive Visualization System for Network Security Data. J Sign Process Syst 95, 393–405 (2023). https://doi.org/10.1007/s11265-023-01836-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-023-01836-0

Keywords

Navigation