Visual analysis framework for network abnormal data based on multi-agent model
- PDF / 2,169,009 Bytes
- 13 Pages / 595.276 x 790.866 pts Page_size
- 26 Downloads / 182 Views
(0123456789().,-volV)(0123456789(). ,- volV)
METHODOLOGIES AND APPLICATION
Visual analysis framework for network abnormal data based on multiagent model Zhuo Li1
Ó Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract With the development of Internet, the amount of data increases exponentially. With the development of network technology, human beings have entered the era of big data. Therefore, it is very important to find valuable information from massive network data. At present, most of the network security products in the market record the system test results in the form of logs. Users can view and analyze the log information one by one to find out the suspicious behavior and carry out the next diagnosis. Finally, they can defend the identified attacks. Intrusion detection system usually stores detection results in the form of alert files. There may be a large number of redundant or false alarm information in the alarm file, so the heavy cognitive burden of users has become one of the disadvantages of traditional intrusion detection system. In consideration of the above situation, visualization technology has been introduced into the field of network security by researchers. The network visualization analysis displays the massive network data and log information in the way of graph and image, and uses the developed human vision to process the massive graphical data. Data visualization is a method of transforming abstract symbols into concrete geometric figures, which presents the results of simulation and calculation in the form of figures and images. In this paper, multi-agent model is used to build a network data visualization analysis model. The experimental results show that the method in this paper can effectively visualize a large number of network data, and the experimental results are easy to understand. Keywords Network data Intrusion detection Visual analysis Multi-agent model Intelligent algorithm Collaboration
1 Introduction The development of hardware technology and communication technology in the twentieth century has promoted the rapid development of information technology and Internet technology. People get and spread information in more diverse ways. Information, in essence, is a certain amount of data. With the development of technology, the form of data has changed from a single text to a complex form of multimedia such as pictures, audio and video. In today’s Internet age, everyone is generating a lot of data every day. In the era of massive data explosion, the concept
Communicated by V. Loia. & Zhuo Li [email protected] 1
School of Computer Science, Chengdu Normal University, Chengdu 611130, China
of ‘‘big data’’ has gradually aroused heated discussion in all walks of life. People summarize the characteristics of big data, that is, volume, variety, velocity and value. Big data technology brings people new challenges and opportunities. Large data with complex structure and large volume contain all kinds of valuable information (Lei et al. 2014; Doctorow 2008;
Data Loading...