Font Size: a A A

The Realization Of Visual Analysis Function Of Charis System Security Event

Posted on:2016-12-10Degree:MasterType:Thesis
Country:ChinaCandidate:M H YaoFull Text:PDF
GTID:2308330482475084Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet network technology and application, the security problem of large scale network is more prominent, and the data security visualization analysis is more and more applied in network management and network security situation awareness.The content of this paper is "the three phase of the 211 phase of public service system construction project" China Education and research computer network backbone network and key subject information service system upgrade and expansion project ", for the CHAIRS system to deal with the problem of security event, for event handling efficiency and the internal connection between the event, to meet the needs of network security incident analysis and prevention.First, the paper introduces the visualization technology background knowledge and abroad is now safe analysis of more big data platform, analyzes the five categories visual analysis of key technologies, mainly based on the network security network traffic visualization technology, based on port information network security visualization technology, network-based intrusion detection security visualization techniques, network-based firewall security event visualization technologies and network security based on other visualization techniques. Through five class technology based on the needs of the system, but also a manifestation of visual graphics and drawing methods such as D3, Echarts, can solve the system requirements visualizations.Secondly, the paper is based on the structure and function of the CHAIRS system, the structure of the system is optimized, and the design of the security event visualization module is completed. In the visualization module design, through the re design of the security event data, according to the new data attributes, through the advantages and disadvantages contrast, select the intermediate structure of the visual module data conversion.Then, the paper references the relevant technical documents and examples, according to different data sources, different data sources and graphics corresponding to the visual graphics, and according to the data source and graphics. Analysis system to the function of the demand, design the corresponding alternative visualization graphics, and then through the time control, link and select and table frame input and other means to complete the data control and data conversion, focus on some of the key code to do a detailed introduction and examples. Next, the security event visualization function is integrated, and the realization of the security event visualization analysis platform is realized.Finally, the paper makes a detailed explanation and examples of data processing of D3 and Echarts, and describes the requirements and specific operations of each function.
Keywords/Search Tags:Security event visualization, D3, Echarts, Visualization Technology, security situational awareness, testing
PDF Full Text Request
Related items