计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 340-343.doi: 10.11896/JsJkx.190500169

• 信息安全 • 上一篇    下一篇

网络安全态势感知研究现状与发展趋势的图谱分析

白雪, 努尔布力, 王亚东   

  1. 新疆大学信息科学与工程学院 乌鲁木齐 830046
  • 发布日期:2020-07-07
  • 通讯作者: 努尔布力(nurbol@xJu.edu.cn)
  • 作者简介:409429237@qq.com
  • 基金资助:
    国家自然基金重点项目(重大联合)(61433012);新疆维吾尔自治区创新环境建设专项项目(PT1811)

Map Analysis for Research Status and Development Trend on Network Security Situational Awareness

BAI Xue, Nurbol and WANG Ya-dong   

  1. School of Information Science and Engineering,XinJiang University,Urumqi 830046,China
  • Published:2020-07-07
  • About author:BAI Xue, born in 1993, postgraduate, is a member of China Computer Federation.Her main research interests include network security and data visua-lization.
    Nurbol, born in 1981, Ph.D, professor, is a member of China Computer Federation.His main research interests include network security and data mining.
  • Supported by:
    This work was supported by the Key Program of the National Natural Science Foundation of China (61433012) and Special Foundation for Innovative Environment Construction of XinJiang Province (PT1811).

摘要: 文中以Web of Science中1999-2019年收录的2456篇以网络安全态势感知为主题的文献作为数据来源,主要运用 CiteSpace可视化工具,基于图谱对国家与机构合作、文献共被引、关键词共现等进行分析,并分析了国际上该领域的研究热点及研究脉络。研究发现,网络安全态势感知在理论方面需要加强形成体系,并进一步深入研究;应用方面对于多源数据融合的研究较为成熟,但对态势实时感知可视化方面提出了更多的挑战。文中分析结果有助于为该领域的研究人员做进一步深层研究提供参考。

关键词: CiteSpace, 可视分析, 态势感知, 网络安全, 知识图谱

Abstract: Taking 2456 papers on network security situational awareness included in Web of Science from 1999 to 2019 as data sources,and mainly using CiteSpace visualization tools,this paper analyzes the international research hotspots and research context in this field by analyzing cooperation between countries and institutions,literature co-citation,keyword co-occurrence.The research finds that the network security situation awareness needs to strengthen the theoretical formation of a system for further in-depth research.In terms of application,the research on multi-source data fusion is relatively mature,but it poses more research challenges to the visualization of real-time situational awareness.The analysis results are helpful for the researchers in this field to do further research.

Key words: CiteSpace, Knowledge graph, Network security, Situational awareness, Visual analysis

中图分类号: 

  • TP393
[1] CHEN Y,CHEN C M,LIU Z Y,et al.The methodology function of CiteSpace mapping knowledge domains .Studies in Science of Science,2015,33(2):242-253.
[2] CHEN C M.CiteSpace II:Detecting and visualizing emerging trends and transient patterns in scientific literature .Journal of the Association for Information Science & Technology,2014,57(3):359-377.
[3] CHEN H,CHEN G,BLASCH E.Analysis and visualization of large complex attack graphs for networks security//Defense &Security Symposium.International Society for Optics and Photonics,2007.
[4] SALMON P M,STANTON N A,WALKER G H,et al.Is it really better to share? Distributed situation awareness and its implications for collaborative system design .Theoretical Issues in Ergonomics Science,2010,11(1/2):58-83.
[5] BASS T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99-105.
[6] SHIFFLET J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Mid states Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13-19.
[7] ENDSLEY M R.Situation awareness misconceptions and misunderstandings.Journal of Cognitive Engineering & Decision Making,2015,9(1):4-32.
[8] SHIRAVI H,SHIRAVI A,GHORBANI A A.A survey of visua-lization systems for network security .Visualization and Computer Graphics,2012,18(8):1313-1329.
[9] GONG J,ZANG X D,SU Q,et al.Survey of Network Security Situation Awareness .Journal of Software,2017,28(4):1010-1026.
[10] LIN H L,WANG Y Z,JIA Y T,et al.Network big data oriented knowledge fusion methods:A survey .Chinese Journal of Computers,2017,40(1):1-27.
[11] FRANKE U,BRYNIELSSON J.Cyber situational awareness-A systematic review of the literature .Computers & Security,2014,46(1):18-31.
[12] GUANG K,SHUO W,GUANGMING T.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction.Chinese Journal of Electronics,2019,28(1):162-171.
[13] BEAVER J,STEED C,PATTON R,et al.Visualization techniques for computer network defense.Proc.of the SPIE Int’l Society for Optical Engineering,2011,8019(18):6-9.
[14] WANG H Q,LAI J B,ZHU L,et al.Survey of network situation awareness system.Journal of Computer Science,2006,33(10):5-10.
[1] 徐涌鑫, 赵俊峰, 王亚沙, 谢冰, 杨恺.
时序知识图谱表示学习
Temporal Knowledge Graph Representation Learning
计算机科学, 2022, 49(9): 162-171. https://doi.org/10.11896/jsjkx.220500204
[2] 饶志双, 贾真, 张凡, 李天瑞.
基于Key-Value关联记忆网络的知识图谱问答方法
Key-Value Relational Memory Networks for Question Answering over Knowledge Graph
计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277
[3] 吴子仪, 李邵梅, 姜梦函, 张建朋.
基于自注意力模型的本体对齐方法
Ontology Alignment Method Based on Self-attention
计算机科学, 2022, 49(9): 215-220. https://doi.org/10.11896/jsjkx.210700190
[4] 孔世明, 冯永, 张嘉云.
融合知识图谱的多层次传承影响力计算与泛化研究
Multi-level Inheritance Influence Calculation and Generalization Based on Knowledge Graph
计算机科学, 2022, 49(9): 221-227. https://doi.org/10.11896/jsjkx.210700144
[5] 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠.
基于战术关联的网络安全风险评估框架
Network Security Risk Assessment Framework Based on Tactical Correlation
计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171
[6] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[7] 秦琪琦, 张月琴, 王润泽, 张泽华.
基于知识图谱的层次粒化推荐方法
Hierarchical Granulation Recommendation Method Based on Knowledge Graph
计算机科学, 2022, 49(8): 64-69. https://doi.org/10.11896/jsjkx.210600111
[8] 王杰, 李晓楠, 李冠宇.
基于自适应注意力机制的知识图谱补全算法
Adaptive Attention-based Knowledge Graph Completion
计算机科学, 2022, 49(7): 204-211. https://doi.org/10.11896/jsjkx.210400129
[9] 赵冬梅, 吴亚星, 张红斌.
基于IPSO-BiLSTM的网络安全态势预测
Network Security Situation Prediction Based on IPSO-BiLSTM
计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103
[10] 杜鸿毅, 杨华, 刘艳红, 杨鸿鹏.
基于网络媒体的非线性动力学信息传播模型
Nonlinear Dynamics Information Dissemination Model Based on Network Media
计算机科学, 2022, 49(6A): 280-284. https://doi.org/10.11896/jsjkx.210500043
[11] 陶礼靖, 邱菡, 朱俊虎, 李航天.
面向网络安全训练评估的受训者行为描述模型
Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment
计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048
[12] 马瑞新, 李泽阳, 陈志奎, 赵亮.
知识图谱推理研究综述
Review of Reasoning on Knowledge Graph
计算机科学, 2022, 49(6A): 74-85. https://doi.org/10.11896/jsjkx.210100122
[13] 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓.
一种可快速迁移的领域知识图谱构建方法
Fast and Transmissible Domain Knowledge Graph Construction Method
计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018
[14] 杜晓明, 袁清波, 杨帆, 姚奕, 蒋祥.
军事指控保障领域命名实体识别语料库的构建
Construction of Named Entity Recognition Corpus in Field of Military Command and Control Support
计算机科学, 2022, 49(6A): 133-139. https://doi.org/10.11896/jsjkx.210400132
[15] 吕鹏鹏, 王少影, 周文芳, 连阳阳, 高丽芳.
基于进化神经网络的电力信息网安全态势量化方法
Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network
计算机科学, 2022, 49(6A): 588-593. https://doi.org/10.11896/jsjkx.210200151
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!