International Journal of Mathematical, Engineering and Management Sciences

ISSN: 2455-7749

Big Data and IT Network Data Visualization

Big Data and IT Network Data Visualization

Lidong Wang
Department of Engineering Technology, Mississippi Valley State University, USA.

DOI https://dx.doi.org/10.33889/IJMEMS.2018.3.1-002

Received on January 16, 2017
Accepted on April 03, 2017


Visualization with graphs is popular in the data analysis of Information Technology (IT) networks or computer networks. An IT network is often modelled as a graph with hosts being nodes and traffic being flows on many edges. General visualization methods are introduced in this paper. Applications and technology progress of visualization in IT network analysis and big data in IT network visualization are presented. The challenges of visualization and Big Data analytics in IT network visualization are also discussed. Big Data analytics with High Performance Computing (HPC) techniques, especially Graphics Processing Units (GPUs) helps accelerate IT network analysis and visualization.

Keywords- Big data, Visualization, Network intrusion detection, Graphics processing units (GPUs), Data mining, Machine learning.


Wang, L. (2018). Big Data and IT Network Data Visualization. International Journal of Mathematical, Engineering and Management Sciences, 3(1), 9-16. https://dx.doi.org/10.33889/IJMEMS.2018.3.1-002.

Conflict of Interest



Akoglu, L., Tong, H., & Koutra, D. (2015). Graph based anomaly detection and description: a survey. Data Mining and Knowledge Discovery, 29(3), 626-688.

Attunity (2012). Enabling big data analytics by replicating oracle data to Greenplum, database trends and applications, September 12.

Barrionuevo, M., Lopresti, M., Miranda, N., & Piccoli, M. F. (2015). Solving a big-data problem with GPU: the network traffic analysis. Journal of Computer Science & Technology, 15(1), 30-39.

Cai, X., Nie, F., & Huang, H. (2013). Multi-View K-means clustering on big data. Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence (IJCAI), 2598- 2604.

Cao, L., Wang, Q., & Rundensteiner, E. A. (2014). Interactive outlier exploration in big data streams. Proceedings of the VLDB Endowment, 7(13), 1621-1624.

Cao, N. (2014). Big data analytics lecture: data visualization. Columbia University.

Datameer, Inc. (2013). The guide to big data analytics, White Paper, 1-39.

Elhenawy, I., Riad, A. E. D., Hassan, A., & Awadallah, N. (2011). Visualization techniques for intrusion detection- a survey. International Journal of Computer Science and Engineering Survey, 2(3),107-119

Gaffar, A., Darwish, E. M., & Tridane, A. (2014). Structuring heterogeneous big data for scalability and accuracy. International Journal of Digital Information and Wireless Communications, 4(1), 10-23.

Gangone, M. V., Whelan, M. J., & Janoyan, K. D. (2011). Wireless monitoring of a multi-span bridge superstructure for diagnostic load testing and system identification. Computer-Aided Civil and Infrastructure Engineering, 26(7), 560–579.

Glisic, B., Yarnold, M. T., Moon, F. L., & Aktan, A. E. (2014). Advanced visualization and accessibility to heterogeneous monitoring data. Computer‐Aided Civil and Infrastructure Engineering, 29(5), 382-398.

Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2005). Preserving the big picture: Visual network traffic analysis with TNV. In IEEE Workshop on Visualization for Computer Security, (VizSEC 05). 47-54.

Han, J., & Kamber, M. (2006). Data mining: concepts and techniques, second edition. Morgan Kaufmann Publishers.

Hertzmann, A., & Fleet, D. (2012). Machine learning and data mining lecture notes. University of Toronto Publisher, February 6.

Keim, D. A. (2014). Exploring big data using visual analytics. EDBT/ICDT Workshops.

Li, S., & Wu, Z. (2008). A model-free method for damage locating and quantifying in beam-like structure based on dynamic distributed strain measurements. Computer-Aided Civil and Infrastructure Engineering, 23(5), 404–413.

Liao, Q., Shi, L., & Sun, X. (2012). Anomaly analysis and visualization through compressed graphs. IEEE LDAV Poster Session.

Lynch, J. P. (2007). An overview of wireless structural health monitoring for civil structures. Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 365(1851), 345-372.

Madden, S. (2014). Tackling the challenges of big data: visualizing twitter. Workshop, Massachusetts Institute of Technology.

Mansmann, F., Fischer, F., Keim, D. A., & North, S. C. (2009, November). Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations. In Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology (pp. 19-28). ACM.

Marode, M. D. K., & Chavan, R. K. (2014). Survey of network traffic visualization techniques. International Journal of Computer Technology & Applications, 5(3), 876-883.

Ravet, F., Briffod, F., Glisic, B., Nikles, M., & Inaudi, D. (2009). Submillimeter crack detection with Brillouin-based fiber-optic sensors, IEEE Sensors Journal, 9(11), 1391-1396.

Sigurdardottir, D. H., Afonso, J. P. S., Hubbell, D. L. K., & Glisic, B. (2012). Streicker bridge: a two-year monitoring overview, bridge maintenance, safety, management, resilience and sustainability-Proceedings of the Sixth International Conference on Bridge Maintenance, Safety and Management, Stresa, Italy, July 8–12, pp.790–797.

Streit, M. (2011). Guided visual analysis of heterogeneous data. Dissertation. Graz University of Technology, Graz, Austria, February.

Suthaharan, S. (2014). Big data classification: problems and challenges in network intrusion prediction with machine learning. ACM SIGMETRICS Performance Evaluation Review, 41(4), 70-73.

Wang, L., & Alexander, C. A. (2016a). Additive manufacturing and big data. International Journal of Mathematical, Engineering and Management Sciences, 1(3), 107–121.

Wang, L., & Alexander, C. A. (2016b). Machine learning in big data. International Journal of Mathematical, Engineering and Management Sciences, 1(2), 52–61.

Youssef, A., & Emam, A. (2011). Network intrusion detection using data mining and network behaviour analysis. International Journal of Computer Science & Information Technology, 3(6), 87-98.