Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 340-343.doi: 10.11896/JsJkx.190500169

• Information Security • Previous Articles     Next Articles

Map Analysis for Research Status and Development Trend on Network Security Situational Awareness

BAI Xue, Nurbol and WANG Ya-dong   

  1. School of Information Science and Engineering,XinJiang University,Urumqi 830046,China
  • Published:2020-07-07
  • About author:BAI Xue, born in 1993, postgraduate, is a member of China Computer Federation.Her main research interests include network security and data visua-lization.
    Nurbol, born in 1981, Ph.D, professor, is a member of China Computer Federation.His main research interests include network security and data mining.
  • Supported by:
    This work was supported by the Key Program of the National Natural Science Foundation of China (61433012) and Special Foundation for Innovative Environment Construction of XinJiang Province (PT1811).

Abstract: Taking 2456 papers on network security situational awareness included in Web of Science from 1999 to 2019 as data sources,and mainly using CiteSpace visualization tools,this paper analyzes the international research hotspots and research context in this field by analyzing cooperation between countries and institutions,literature co-citation,keyword co-occurrence.The research finds that the network security situation awareness needs to strengthen the theoretical formation of a system for further in-depth research.In terms of application,the research on multi-source data fusion is relatively mature,but it poses more research challenges to the visualization of real-time situational awareness.The analysis results are helpful for the researchers in this field to do further research.

Key words: CiteSpace, Knowledge graph, Network security, Situational awareness, Visual analysis

CLC Number: 

  • TP393
[1] CHEN Y,CHEN C M,LIU Z Y,et al.The methodology function of CiteSpace mapping knowledge domains .Studies in Science of Science,2015,33(2):242-253.
[2] CHEN C M.CiteSpace II:Detecting and visualizing emerging trends and transient patterns in scientific literature .Journal of the Association for Information Science & Technology,2014,57(3):359-377.
[3] CHEN H,CHEN G,BLASCH E.Analysis and visualization of large complex attack graphs for networks security//Defense &Security Symposium.International Society for Optics and Photonics,2007.
[4] SALMON P M,STANTON N A,WALKER G H,et al.Is it really better to share? Distributed situation awareness and its implications for collaborative system design .Theoretical Issues in Ergonomics Science,2010,11(1/2):58-83.
[5] BASS T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99-105.
[6] SHIFFLET J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Mid states Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13-19.
[7] ENDSLEY M R.Situation awareness misconceptions and misunderstandings.Journal of Cognitive Engineering & Decision Making,2015,9(1):4-32.
[8] SHIRAVI H,SHIRAVI A,GHORBANI A A.A survey of visua-lization systems for network security .Visualization and Computer Graphics,2012,18(8):1313-1329.
[9] GONG J,ZANG X D,SU Q,et al.Survey of Network Security Situation Awareness .Journal of Software,2017,28(4):1010-1026.
[10] LIN H L,WANG Y Z,JIA Y T,et al.Network big data oriented knowledge fusion methods:A survey .Chinese Journal of Computers,2017,40(1):1-27.
[11] FRANKE U,BRYNIELSSON J.Cyber situational awareness-A systematic review of the literature .Computers & Security,2014,46(1):18-31.
[12] GUANG K,SHUO W,GUANGMING T.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction.Chinese Journal of Electronics,2019,28(1):162-171.
[13] BEAVER J,STEED C,PATTON R,et al.Visualization techniques for computer network defense.Proc.of the SPIE Int’l Society for Optical Engineering,2011,8019(18):6-9.
[14] WANG H Q,LAI J B,ZHU L,et al.Survey of network situation awareness system.Journal of Computer Science,2006,33(10):5-10.
[1] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[2] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[3] WU Zi-yi, LI Shao-mei, JIANG Meng-han, ZHANG Jian-peng. Ontology Alignment Method Based on Self-attention [J]. Computer Science, 2022, 49(9): 215-220.
[4] KONG Shi-ming, FENG Yong, ZHANG Jia-yun. Multi-level Inheritance Influence Calculation and Generalization Based on Knowledge Graph [J]. Computer Science, 2022, 49(9): 221-227.
[5] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[6] QIN Qi-qi, ZHANG Yue-qin, WANG Run-ze, ZHANG Ze-hua. Hierarchical Granulation Recommendation Method Based on Knowledge Graph [J]. Computer Science, 2022, 49(8): 64-69.
[7] WANG Jie, LI Xiao-nan, LI Guan-yu. Adaptive Attention-based Knowledge Graph Completion [J]. Computer Science, 2022, 49(7): 204-211.
[8] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[9] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[10] MA Rui-xin, LI Ze-yang, CHEN Zhi-kui, ZHAO Liang. Review of Reasoning on Knowledge Graph [J]. Computer Science, 2022, 49(6A): 74-85.
[11] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[12] DU Xiao-ming, YUAN Qing-bo, YANG Fan, YAO Yi, JIANG Xiang. Construction of Named Entity Recognition Corpus in Field of Military Command and Control Support [J]. Computer Science, 2022, 49(6A): 133-139.
[13] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[14] XIONG Zhong-min, SHU Gui-wen, GUO Huai-yu. Graph Neural Network Recommendation Model Integrating User Preferences [J]. Computer Science, 2022, 49(6): 165-171.
[15] ZHONG Jiang, YIN Hong, ZHANG Jian. Academic Knowledge Graph-based Research for Auxiliary Innovation Technology [J]. Computer Science, 2022, 49(5): 194-199.
Full text



No Suggested Reading articles found!