Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 340-343.doi: 10.11896/JsJkx.190500169

• Information Security • Previous Articles     Next Articles

Map Analysis for Research Status and Development Trend on Network Security Situational Awareness

BAI Xue, Nurbol and WANG Ya-dong   

  1. School of Information Science and Engineering,XinJiang University,Urumqi 830046,China
  • Published:2020-07-07
  • About author:BAI Xue, born in 1993, postgraduate, is a member of China Computer Federation.Her main research interests include network security and data visua-lization.
    Nurbol, born in 1981, Ph.D, professor, is a member of China Computer Federation.His main research interests include network security and data mining.
  • Supported by:
    This work was supported by the Key Program of the National Natural Science Foundation of China (61433012) and Special Foundation for Innovative Environment Construction of XinJiang Province (PT1811).

Abstract: Taking 2456 papers on network security situational awareness included in Web of Science from 1999 to 2019 as data sources,and mainly using CiteSpace visualization tools,this paper analyzes the international research hotspots and research context in this field by analyzing cooperation between countries and institutions,literature co-citation,keyword co-occurrence.The research finds that the network security situation awareness needs to strengthen the theoretical formation of a system for further in-depth research.In terms of application,the research on multi-source data fusion is relatively mature,but it poses more research challenges to the visualization of real-time situational awareness.The analysis results are helpful for the researchers in this field to do further research.

Key words: Network security, Situational awareness, CiteSpace, Visual analysis, Knowledge graph

CLC Number: 

  • TP393
[1] CHEN Y,CHEN C M,LIU Z Y,et al.The methodology function of CiteSpace mapping knowledge domains .Studies in Science of Science,2015,33(2):242-253.
[2] CHEN C M.CiteSpace II:Detecting and visualizing emerging trends and transient patterns in scientific literature .Journal of the Association for Information Science & Technology,2014,57(3):359-377.
[3] CHEN H,CHEN G,BLASCH E.Analysis and visualization of large complex attack graphs for networks security//Defense &Security Symposium.International Society for Optics and Photonics,2007.
[4] SALMON P M,STANTON N A,WALKER G H,et al.Is it really better to share? Distributed situation awareness and its implications for collaborative system design .Theoretical Issues in Ergonomics Science,2010,11(1/2):58-83.
[5] BASS T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99-105.
[6] SHIFFLET J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Mid states Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13-19.
[7] ENDSLEY M R.Situation awareness misconceptions and misunderstandings.Journal of Cognitive Engineering & Decision Making,2015,9(1):4-32.
[8] SHIRAVI H,SHIRAVI A,GHORBANI A A.A survey of visua-lization systems for network security .Visualization and Computer Graphics,2012,18(8):1313-1329.
[9] GONG J,ZANG X D,SU Q,et al.Survey of Network Security Situation Awareness .Journal of Software,2017,28(4):1010-1026.
[10] LIN H L,WANG Y Z,JIA Y T,et al.Network big data oriented knowledge fusion methods:A survey .Chinese Journal of Computers,2017,40(1):1-27.
[11] FRANKE U,BRYNIELSSON J.Cyber situational awareness-A systematic review of the literature .Computers & Security,2014,46(1):18-31.
[12] GUANG K,SHUO W,GUANGMING T.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction.Chinese Journal of Electronics,2019,28(1):162-171.
[13] BEAVER J,STEED C,PATTON R,et al.Visualization techniques for computer network defense.Proc.of the SPIE Int’l Society for Optical Engineering,2011,8019(18):6-9.
[14] WANG H Q,LAI J B,ZHU L,et al.Survey of network situation awareness system.Journal of Computer Science,2006,33(10):5-10.
[1] LI Xin, DUAN Yong-cheng. Network Security Situation Assessment Method Based on Improved Hidden Markov Model [J]. Computer Science, 2020, 47(7): 287-291.
[2] BAI Wei, PAN Zhi-song, XIA Shi-ming, CHENG Ang-xuan. Network Security Configuration Generation Framework Based on Genetic Algorithm Optimization [J]. Computer Science, 2020, 47(5): 306-312.
[3] LI Xin-chao, LI Pei-feng, ZHU Qiao-ming. Knowledge Graph Representation Based on Improved Vector Projection Distance [J]. Computer Science, 2020, 47(4): 189-193.
[4] XIANG Ying, FENG Jun, XIA Pei-pei, LU Jia-min. Extraction of Water Conservancy Spatial Relationship Words Based on Bootstrapping [J]. Computer Science, 2020, 47(12): 131-138.
[5] XIAO Yong, QIAN Bin, ZHOU Mi. Cross-media Knowledge Graph Construction for Electric Power Metering Based on Semantic Correlation [J]. Computer Science, 2020, 47(11A): 126-131.
[6] ZHANG Chun-xia, PENG Cheng, LUO Mei-qiu, NIU Zhen-dong. Construction of Mathematics Course Knowledge Graph and Its Reasoning [J]. Computer Science, 2020, 47(11A): 573-578.
[7] LI Zhong-wen, DING Ye, HUA Zhong-yun, LI Jun-yi, LIAO Qing. Knowledge Graph Completion Model Based on Triplet Importance Integration [J]. Computer Science, 2020, 47(11): 231-236.
[8] CHEN Xiao-jun, XIANG Yang. Construction and Application of Enterprise Risk Knowledge Graph [J]. Computer Science, 2020, 47(11): 237-243.
[9] LIU Hai-bo,WU Tian-bo,SHEN Jing,SHI Chang-ting. Advanced Persistent Threat Detection Based on Generative Adversarial Networks and Long Short-term Memory [J]. Computer Science, 2020, 47(1): 281-286.
[10] CHEN Xiao-jun, XIANG Yang. STransH:A Revised Translation-based Model for Knowledge Representation [J]. Computer Science, 2019, 46(9): 184-189.
[11] SUN Guo-dao, ZHOU Zhi-xiu, LI Si, LIU Yi-peng, LIANG Rong-hua. Spatio-Temporal Evolution of Geographical Topics [J]. Computer Science, 2019, 46(8): 42-49.
[12] LI Peng-fei, CHEN Ming, DENG Li, QIAN Hong-yan. NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol [J]. Computer Science, 2019, 46(6A): 343-347.
[13] ZHANG Jie-hui, PAN Chao, ZHANG Yong. Network System Risk Assessment Model with Optimal Weights [J]. Computer Science, 2019, 46(6): 148-152.
[14] FU Ze-qiang, WANG Xiao-feng, KONG Jun. High-performance Association Analysis Method for Network Security Alarm Information [J]. Computer Science, 2019, 46(5): 116-121.
[15] RAO Yong-ming, ZHANG Yan-kong, XIE Wen-jun, LIU Lu, LIU Xin-yue, LUO Yue-tong. Visual Analysis Method of Traffic Accident Spatial-Temporal Pattern [J]. Computer Science, 2019, 46(4): 14-21.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .