期刊文献+

基于两级审计的分布式内容审计系统

A Distributed Network Information System Based on Two-Level Audit
下载PDF
导出
摘要 目前,电信骨干网络大量采用2.5Gbps和10Gbps链路,对这类链路的流量进行审计必然需要采取机群方式,因此,如何进行负载平衡,如何尽可能减少后端分析系统的负载是迫切需要解决的问题。本文提出了一种基于两级审计的网络信息审计系统T-DNIAS,它由三部分组成预处理分流结点、审计结点和控制结点。实际应用表明,它能有效地对内容进行审计,识别非法信息,并且所需要的审计结点非常少。 The backbone links are now upgrading from 2. 5G bps to 10G bps, how to solve the load-balancing problem and reduce the loads of back-end analysis systems are imminent. This acticle introduces a network information auditing sys tem based on two-level audit(T-DNIAS) ,which consists of a preauditing node, an auditing node and a control node. The system recognizes illegal information efficiently,and needs few auditing nodes.
出处 《计算机工程与科学》 CSCD 2006年第6期1-3,6,共4页 Computer Engineering & Science
关键词 信息审计 近似串匹配 分布式系统 高速网络 内容过滤 information audit approximate string match distributed system high speed network content filtering
  • 相关文献

参考文献6

二级参考文献15

  • 1[1]V Paxson. Bro: A system for detecting network intruders in real-time. USENIX Association, 1998, 1(1): 31~51
  • 2[2]K Huang, Z W Xu. Scalable Parallel Computing. Hongkong: China Machine Press, 2000
  • 3[3]D D Clark, S Shenker, L X Zhang. Supporting real-time applications in an integrated services packet network architecture and mechanism. Proc of ACM SIGCOMM, Baltimore, Maryland, USA, 1992
  • 4[4]A Demers, S Keshavt, S Shenker. Analysis and simulation of fair queuing algorithm. Proc of ACM SIGCOMM, Austin, TX, USA, 1989
  • 5[5]G Varghese, M Shreedar. Efficient fair queuing using deficit round robin. Proc of ACM SIGCOMM, Cambridge, MA, USA, 1995
  • 6[6]S Floyd, V Jacobson. Link-sharing and resource management models for packet network. IEEE/ACM Trans on Networking, 1995, 3(4): 365~386
  • 7[7]I Stoica, S Shenker, H Zhang. Core-stateless fair queuing: Achieving approximately fair bandwidth allocations in high speed networks. Computer Communication Review, 1998, 28(4): 118~130
  • 8[8]C Kruegel, F Valeur, G Vigna et al. Stateful intrusion detection for high-speed networks. In: Proc of the 2002 IEEE Symp on Security and Privacy. Los Alamitos, California: IEEE Computer Society Press, 2002. 285~294
  • 9[9]N F Puketza, K Zhang, M Chung et al. A methodology for testing intrusion detection systems. IEEE Trans on Software Engineering, 1996, 22(10): 719~729
  • 10[1]RS Boyer, J S Moore. A fast string searching algorithm.Communications of ACM, 1977, 20(10): 762~772

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部