4.1 Application Case Analysis of the Network Security Situational Awareness Platform
in the Financial Industry
In practical application, the platform shows significant application value. First
of all, in terms of abnormal detection, the platform monitors network traffic and
user behavior in real time, and finds abnormal traffic patterns and potential malicious
behaviors [28]. Through the automatic blocking or alarm function, the risk of network attack is
effectively reduced. Secondly, in terms of threat hunting and traceability analysis,
the platform comprehensively analyzes network traffic and log data, finds hidden attack
clues, tracks the attack source, and provides detailed attack path and tool analysis
for the security team, which is helpful to quickly locate and handle security incidents.
Furthermore, the platform offers a user behavior analysis feature that tracks and
scrutinizes users' network actions to promptly identify potential security hazards,
such as data breaches or unauthorized access. These functionalities expedite the implementation
of timely interventions and corrective measures. The platform also has the function
of network security visualization. By visualizing the complex data, users are provided
with an intuitive network security situational awareness interface. This not only
helps to quickly understand the overall security situation of the network, but also
provides strong data support for decision makers. For example, the safety dashboard
can display cyber threat maps, traffic trends and other information in real time,
providing strong support for the security team's rapid response [29]. By introducing the network security situation awareness platform, the bank achieves
the following aspects: first, it improves the discovery rate and disposal efficiency
of security incidents; second, it reduces the network security risk and reduces potential
losses; third, it improves the user behavior analysis ability and strengthens the
internal management and supervision; fourth, it provides the network security visualization
interface to facilitate the work of decision makers and security teams. However, the
platform also faces some challenges in practical application [30].
4.2 Experimental Analysis
The experimental steps are divided into data acquisition, data processing, data analysis,
platform application, visual demonstration, and experimental evaluation. Fig. 4 shows the amount of data obtained through different forms.
Fig. 4. The amount of data obtained through the different forms.
Utilizing technologies such as network traffic mirroring and network data packet capture,
data collection gathers network traffic data and log data. The amassed data encompasses
network traffic, system logs, application logs, and more. Since the platform's inception
in 2018, it has accumulated 650TB of original network security data. Remarkably, in
2023, the platform's average daily influx of new data reached 10GB, representing a
fivefold increase compared to 2018. Data processing the collected raw data is cleaned,
reweighted, classified and processed to eliminate erroneous data and duplicate data
and provide high-quality data sources for subsequent analysis. Analysis content includes
traffic mode recognition, abnormal detection, threat early warning and so on. The
total perception score (AS) is shown in (6).
Visual display will show the analysis results in a visual way, such as the network
topology map, security situation map, etc., so that users can intuitively understand
the network security situation. The configuration and algorithm parameters of the
platform are adjusted according to the actual demand to improve the accuracy of monitoring
and the timeliness of early warning. Experimental evaluation evaluates the function
and performance of the network security situational awareness platform according to
the actual application effect. The evaluation indicators include the real-time performance,
accuracy and stability of the platform. Fig. 5 Statistics of different cyber-threat data.
Fig. 5. Statistics of different network threat data.
Through experimental verification, the network security situational awareness platform
based on big data can effectively monitor the network traffic and log data, and find
the potential security threats and attack behaviors. The following is an analysis
of the experimental results:
Traffic statistics: During the 30 days, the average daily traffic of the enterprise
network was 160GB, and the highest daily traffic reached 220 GB. Flow peaks mainly
on weekdays from 9-11 am and 2-4 PM. The usability index (U) formula is shown in (7).
The resource utilization index (R) is shown in formula (8).
Threat Identification: Following rigorous data analysis and mining, we have pinpointed
2,300 potential security threat events. Of these, malware attacks constitute 45%,
DDoS attacks account for 30%, phishing sites make up 15%, and the remaining 10% comprises
other threats.Total efficacy score (E) is shown in formula (9).
Response time: The average response time of the platform is 3.5 seconds, and the maximum
response time does not exceed 10 seconds. This indicates a good real-time performance
and responsiveness of the platform. Fig. 6 Comparison of the response and disposal time when facing different networks.
Fig. 6. Comparison of response and disposal time for different networks.
In terms of data analysis, the platform uses big data analysis technology to conduct
in-depth analysis of the processed data. Through traffic mode identification, abnormal
detection and threat warning, potential security threats and attacks can be found
in time. At the same time, through machine learning and data mining and other technologies,
can automatically learn and optimize security strategies, improve the accuracy and
timeliness of early warning. As shown in the formula (10).
In terms of visual display, the platform presents the analysis results to the users
in a visual way. Through the intuitive network topology map and security situation
map and other display means, users can quickly understand the network security situation
and make the corresponding security decisions. This improves the efficiency and effect
of safety management. User feedback score (FS) and total integration score (IS) formula
is shown in (11).
The total integration score (IS) is shown in (12).
Regarding platform application, the developed network security situational awareness
platform will be implemented in real-world environments for continuous security monitoring.
During practical deployment, the platform's configuration and algorithm parameters
will be fine-tuned in accordance with the evolving needs of users and network environments,
thus enhancing the precision of monitoring and the promptness of early warnings. At
the same time, the platform has strong scalability and customization for different
security scenarios and requirements. Fig. 7 shows the resource allocation and utilization diagram.
In terms of experimental evaluation, the function and performance of the network security
situational awareness platform are evaluated according to the actual application effect.
The evaluation results show that the platform has strong real-time performance, accuracy
and stability. In the face of a complex network environment and diversified security
threats, the platform can provide comprehensive and accurate monitoring and early
warning services.
Fig. 7. Resource allocation and utilization diagram.