{"title":"网络安全大数据可视化:BETH数据集","authors":"Hamza Aytaç Doğanay, Abdullah Orman, Murat Dener","doi":"10.31202/ecjse.1209586","DOIUrl":null,"url":null,"abstract":"In this study, the literature on big data visualization for cyber security purposes was scanned and a purposeful data visualization study was carried out on a sample data set. When the visualization study carried out is compared with its counterpart in the literature, it reveals that if the visualization with the criteria suggested in this study is applied, the user (human) can read the graphics much more easily and it will be a facilitating way for attack detection. The criteria in the study are based on the use of current data sets such as BETH and the use of methods such as Principle Component Analysis (PCA).","PeriodicalId":11622,"journal":{"name":"El-Cezeri Fen ve Mühendislik Dergisi","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Big Data Visualization for Cyber Security: BETH Dataset\",\"authors\":\"Hamza Aytaç Doğanay, Abdullah Orman, Murat Dener\",\"doi\":\"10.31202/ecjse.1209586\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this study, the literature on big data visualization for cyber security purposes was scanned and a purposeful data visualization study was carried out on a sample data set. When the visualization study carried out is compared with its counterpart in the literature, it reveals that if the visualization with the criteria suggested in this study is applied, the user (human) can read the graphics much more easily and it will be a facilitating way for attack detection. The criteria in the study are based on the use of current data sets such as BETH and the use of methods such as Principle Component Analysis (PCA).\",\"PeriodicalId\":11622,\"journal\":{\"name\":\"El-Cezeri Fen ve Mühendislik Dergisi\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"El-Cezeri Fen ve Mühendislik Dergisi\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31202/ecjse.1209586\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"El-Cezeri Fen ve Mühendislik Dergisi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31202/ecjse.1209586","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Big Data Visualization for Cyber Security: BETH Dataset
In this study, the literature on big data visualization for cyber security purposes was scanned and a purposeful data visualization study was carried out on a sample data set. When the visualization study carried out is compared with its counterpart in the literature, it reveals that if the visualization with the criteria suggested in this study is applied, the user (human) can read the graphics much more easily and it will be a facilitating way for attack detection. The criteria in the study are based on the use of current data sets such as BETH and the use of methods such as Principle Component Analysis (PCA).