Abstract
Data visualization is an important approach for data analysis, which can reveal the patterns and characteristics of complex datasets through visual processing, and provide aid for data analysts. In recent years, with the expansion of Internet users and the rich diversity of various Internet applications, the importance of network security is increasing. In the field of network security data analysis, it is a developing direction to use data visualization methods and visual analysis tools to assist manual analysis. In this paper, a visualization system for network security data is designed and implemented, which is mainly based on network flow records and security policies. The node centrality measurement and high-dimensional data visualization methods are comprehensively applied, and an interactive visualization approach is proposed. The IP topology is presented in three different view modes: static analysis, temporal analysis and exploration analysis. In addition, the high-dimensional projection map takes flow, security policy and IP address as analysis objects and selects several dimensional features as indicators. After visual presentation, the distribution of the stream set and IP set contained in the record after projection in the selected dimension space can be obtained, so that the analyst can find the points with significant abnormal eigenvalue distribution, and deduce the possible situation based on this. After testing, the system can accept the new original data record file, and quickly generate the corresponding visualization content, which can be used for the visualization analysis of network security optimization tool software, and has been used in the actual system.
Similar content being viewed by others
Data Availability
Not Applicable.
References
Qiu, M., Xue, C., Shao, Z., et al. (2006). Efficient algorithm of energy minimization for heterogeneous wireless sensor network. IEEE EUC, 25–34.
Niu, J., Gao, Y., Qiu, M., & Ming, Z. (2012). Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC, 72(12), 1565–1575.
Zhang, Y. L. (2022). Network security data visualization fusion analysis method based on multivariate heterogeneous. Electronic Technology and Software Engineering, (15), 5–8.
Qiu, H., Qiu, M., & Lu, R. (2019). Secure V2X communication network based on intelligent PKI and edge computing. IEEE Network, 34(2), 172–178.
Qiu, H., Zeng, Y., et al. (2021). Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation. ACM Asia Conference on Computer and Communications Security.
Hu, G. (2012). Research and Implementation of Network security log data Visual Analysis System. Beijing University of Posts and Telecommunications.
Tao, L., Golikov, S., Gai, K., & Qiu, M. (2015) A reusable software component for integrated syntax and semantic validation for services computing. IEEE Symposium on Service-Oriented System Engineering, 127–132.
Qiu, M., Zhang, K., & Huang, M. (2006). Usability in mobile interface browsing. Web Intelligence and Agent Systems: An International Journal, 4(1), 43–59.
Zhang, K., Kong, J., Qiu, M., & Song, G. (2005). Multimedia layout adaptation through grammatical specifications. Multimedia Systems, 10(3), 245–260.
Qiu, M., Zhang, K., & Huang, M. (2004) An empirical study of web interface design on small display devices. IEEE/WIC/ACM International Conference on Web Intelligence (WI’04), 29–35.
Yu, X., & Yu, C. (2021). Based on the information environment of the network security data visualization study. Journal of Electronic World, (14), 49–50.
Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics, 18(8), 1313–1329.
Zhao, Y., Fan, X., Zhou, F., Wang, F., & Zhang, J. (2014). A survey on network security data visualization. Journal of Computer Aided Design and Graphics.
Chen, W., Shen, Z. Q., & Tao, Y. B. (2013). Data Visualization. Publishing House of Electronics Industry.
Qi, L., Blaich, A., Vanbruggen, D., & Striegel, A. (2010). Managing networks through context: graph visualization and exploration. Computer Networks, 54(16), 2809–2824.
Li, J., Ming, Z., Qiu, M., Quan, G., Qin, X., & Chen, T. (2011). Resource allocation robustness in multi-core embedded systems with inaccurate information. Journal of Systems Architecture, 57(9), 840–849.
Hu, F., Lakdawala, S., Hao, Q., & Qiu, M. (2009). Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Transactions on Information Technology in Biomedicine, 13(4), 656–663.
Zhao, Y., Liang, X., Fan, X., Wang, Y., Yang, M., & Zhou, F. (2014). Mvsec. Journal of Visualization.
Hernan Li D. Y., & Gan, W. Y. (2007). Overview of Importance Node Mining in Complex Networks. Computer Science, 34(12), 1–5.
Rong, L. L., Guo, T. Z., & Wang, J. W. (2008). Centralities of nodes in complex networks. Journal of University of Shanghai for Science and Technology.
Wang, R. S. (2016). Research on Spatiotemporal Multi-dimensional data visualization in big Data environment. Zhejiang University.
Kandogan, E. (2001). Visualizing multi-dimensional clusters, trends, and outliers using star coordinates. Acm Sigkdd International Conference on Knowledge Discovery and data Mining (pp.107-116). DBLP.
Shui, C., Cheng, T., & Li, Hui. (2015). A survey of Network Graph Automatic Layout Algorithms Based on Force-directed Model. Computer Engineering and Science, 37(3), 457–465.
Zhao, L. H. (2009). Research and Implementation of Large-scale Network Topology Visualization Tool. Heilongjiang University.
Haviv, A. Q. (2014). Mean web development.
Acknowledgements
The authors gratefully acknowledge the anonymous reviewers for their helpful suggestions.
Funding
The authors did not receive support from any organization for the submitted work. The authors declare they have no financial interests.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of Interest
The authors declare that they have no competing interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zheng, L., Yu, G. & Zheng, Y. An Interactive Visualization System for Network Security Data. J Sign Process Syst 95, 393–405 (2023). https://doi.org/10.1007/s11265-023-01836-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-023-01836-0