| Literature DB >> 24191145 |
Hui He1, Guotao Fan, Jianwei Ye, Weizhe Zhang.
Abstract
It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system's plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks' topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology.Entities:
Mesh:
Year: 2013 PMID: 24191145 PMCID: PMC3804437 DOI: 10.1155/2013/827376
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Algorithm 1Plane visual algorithm.
Figure 1The influence of the subgraphs' positions on cross-edges.
Algorithm 2
Figure 2The degree distribution map of all the routers in China.
Results of random distribution.
| Cluster no. | Coordinate |
|---|---|
| 1 | (12, 10) |
| 2 | (8, 1) |
| 3 | (0, 6) |
| 4 | (1, 12) |
| 5 | (13, 1) |
| 6 | (7, 1) |
| 7 | (11, 8) |
| 8 | (12, 9) |
| 9 | (2, 5) |
| 10 | (9, 1) |
| 11 | (8, 10) |
| 12 | (2, 13) |
| 13 | (2, 7) |
| 14 | (5, 4) |
| 15 | (7, 10) |
Results of distribution based on force analysis.
| Cluster no. | Coordinate |
|---|---|
| 1 | (6, 0) |
| 2 | (3, 7) |
| 3 | (6, 8) |
| 4 | (5, 8) |
| 5 | (13, 1) |
| 6 | (11, 2) |
| 7 | (2, 3) |
| 8 | (0, 13) |
| 9 | (10, 5) |
| 10 | (11, 5) |
| 11 | (0, 4) |
| 12 | (2, 13) |
| 13 | (4, 2) |
| 14 | (7, 13) |
| 15 | (0, 7) |
Comparison of the two α.
| Random | Based on force analysis | |
|---|---|---|
|
| 0.0021 | 0.0028 |
Figure 3Distribution diagram of the subgraphs.
Figure 4Comparison of the subgraphs' distance when k > 15.
Figure 5The subgraph display of the network logical topology in China.
Figure 6The whole display of the network logical topology in China.