期刊文献+

GLORIAD流量监测与分析系统设计与实现

Design and Implementation of GLORIAD Traffic Monitoring and Analysis System
下载PDF
导出
摘要 文章首先引入了GLORIAD流量监测与分析系统设计和实现的背景;接着介绍了与系统设计实现相关的原理和技术,包括CISCONetFlow技术,以及应用NetFlow技术检测分析DDoS和蠕虫病毒等网络异常流量的方法;然后讨论了系统的总体结构和应用上述技术原理实现各个模块的细节,包括如何实现用户行为分析,以及如何实现检测分析DDoS和蠕虫病毒等网络异常;最后总结了系统实现的结果。 In this paper, we first introduced the background of designing and implementing the GLORIAD Monitoring and Analysis System. Then we described the technical principles related to the system, such as CISCO NetFlow technology, technology of detecting DDoS and worm virus based on NetFlow. In the third part, we described the architecture of the system and the details of all the modules, including how to implement user behavior analysis, and how to implement network abnormal traffic such as DDoS and worm attack monitoring. Last we described the outcome of the system.
出处 《微电子学与计算机》 CSCD 北大核心 2006年第11期155-158,165,共5页 Microelectronics & Computer
关键词 NETFLOW DDOS 蠕虫病毒 异常流量分析 Net flow, DDoS, Worm, Abnormal traffic analysis
  • 相关文献

参考文献6

  • 1Jeff Doyle,Jennifer DeHaven Carroll.Routing TCP/IP volume Ⅱ.北京:人民邮电出版社,2003
  • 2Morrison D R.PATRICIA-practical algorithm to retrieve information coded in alphanumeric[J].Journal of ACM,1968,15(4):514~534
  • 3Keith Sklower.A tree-based routing table for berkeley unix.Technical report,University of California,Berkeley,1993
  • 4秦刚,李俊.应用NetFlow技术进行网络计费的研究[J].微电子学与计算机,2004,21(2):95-98. 被引量:7
  • 5Yiming Gong.Detecting worms and abnormal activities with NetFlow,Part 1 http://www.securityfocus.com/infocus/1796
  • 6Yiming Gong.Detecting worms and abnormal activities with NetFlow,Part 2.http://www.securityfocus.com/infocus/1802

二级参考文献2

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部