System detecting network anomaly with visualization techniques

With the fast development of information technology and computer network, the scale and complexity of network security data grows rapidly. Traditional visualization techniques are no longer suitable. In addition, it designs interactive functions based on the feature of network security analysis, in...

Full description

Bibliographic Details
Main Author: ZHANG Haocheng, WU Xiaojie, TANG Xiang, SHU Runxuan, DING Tianchen, DONG Xiaoju
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018015