Survey on the visualization technologies of threatening security data in cyber space

With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of sci...

Full description

Saved in:
Bibliographic Details
Main Authors: Fan ZHANG, Fan XIE, Jie JIANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018013
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.
ISSN:2096-109X