Visualization analysis and design of DDoS attack
Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with di...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00135 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530275964649472 |
---|---|
author | Yi-fan ZHANG Xiao-ju DONG |
author_facet | Yi-fan ZHANG Xiao-ju DONG |
author_sort | Yi-fan ZHANG |
collection | DOAJ |
description | Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with different views of data, which could show more details and undetected relations among massive data. Besides, some interactions were added into the system, which made it more effective and useful. Finally, it ended up with the comparison of the systems when loading data with the DDoS attack and without it. It made much sense in the application field. |
format | Article |
id | doaj-art-2fbd8c59285541219ff693edbcfddbed |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2017-02-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-2fbd8c59285541219ff693edbcfddbed2025-01-15T03:05:32ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-02-013536559549819Visualization analysis and design of DDoS attackYi-fan ZHANGXiao-ju DONGFirstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with different views of data, which could show more details and undetected relations among massive data. Besides, some interactions were added into the system, which made it more effective and useful. Finally, it ended up with the comparison of the systems when loading data with the DDoS attack and without it. It made much sense in the application field.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00135network securitydata visualizationDDoS attackIP address |
spellingShingle | Yi-fan ZHANG Xiao-ju DONG Visualization analysis and design of DDoS attack 网络与信息安全学报 network security data visualization DDoS attack IP address |
title | Visualization analysis and design of DDoS attack |
title_full | Visualization analysis and design of DDoS attack |
title_fullStr | Visualization analysis and design of DDoS attack |
title_full_unstemmed | Visualization analysis and design of DDoS attack |
title_short | Visualization analysis and design of DDoS attack |
title_sort | visualization analysis and design of ddos attack |
topic | network security data visualization DDoS attack IP address |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00135 |
work_keys_str_mv | AT yifanzhang visualizationanalysisanddesignofddosattack AT xiaojudong visualizationanalysisanddesignofddosattack |