Visualization analysis and design of DDoS attack

Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with di...

Full description

Saved in:
Bibliographic Details
Main Authors: Yi-fan ZHANG, Xiao-ju DONG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00135
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530275964649472
author Yi-fan ZHANG
Xiao-ju DONG
author_facet Yi-fan ZHANG
Xiao-ju DONG
author_sort Yi-fan ZHANG
collection DOAJ
description Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with different views of data, which could show more details and undetected relations among massive data. Besides, some interactions were added into the system, which made it more effective and useful. Finally, it ended up with the comparison of the systems when loading data with the DDoS attack and without it. It made much sense in the application field.
format Article
id doaj-art-2fbd8c59285541219ff693edbcfddbed
institution Kabale University
issn 2096-109X
language English
publishDate 2017-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-2fbd8c59285541219ff693edbcfddbed2025-01-15T03:05:32ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-02-013536559549819Visualization analysis and design of DDoS attackYi-fan ZHANGXiao-ju DONGFirstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with different views of data, which could show more details and undetected relations among massive data. Besides, some interactions were added into the system, which made it more effective and useful. Finally, it ended up with the comparison of the systems when loading data with the DDoS attack and without it. It made much sense in the application field.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00135network securitydata visualizationDDoS attackIP address
spellingShingle Yi-fan ZHANG
Xiao-ju DONG
Visualization analysis and design of DDoS attack
网络与信息安全学报
network security
data visualization
DDoS attack
IP address
title Visualization analysis and design of DDoS attack
title_full Visualization analysis and design of DDoS attack
title_fullStr Visualization analysis and design of DDoS attack
title_full_unstemmed Visualization analysis and design of DDoS attack
title_short Visualization analysis and design of DDoS attack
title_sort visualization analysis and design of ddos attack
topic network security
data visualization
DDoS attack
IP address
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00135
work_keys_str_mv AT yifanzhang visualizationanalysisanddesignofddosattack
AT xiaojudong visualizationanalysisanddesignofddosattack