期刊文献+

基于内容审计的千兆网络监控系统的设计 被引量:6

Design of gigabit network monitoring system based on content auditing
下载PDF
导出
摘要 网络监控系统通过网络处理器和改进的捕获驱动进行高效数据捕获,通过设置虚拟磁盘、优化文件系统进行海量数据存储,并着眼于内容审计,采用多线程、简化协议等方法进行协议分析,解决了在千兆级网络监控中存在的一系列性能问题。 In this network monitoring system, data capture was designed based on network processor and improved capture driver. Huge data storage was described through using virtual disk and optimized file system. For content auditing, multithread and simplified protocol were used to carry on protocol analysis. All of these improve the performance of gigabit network monitoring.
出处 《计算机应用研究》 CSCD 北大核心 2008年第4期1114-1116,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(70471064)
关键词 网络监控 数据捕获 数据存储 协议还原 内容审计 network monitoring data capture data storage protocol restore content auditing
  • 相关文献

参考文献6

  • 1李超,杨义先,钮心忻.一种新的高效主机监控审计系统[J].计算机应用研究,2006,23(8):97-99. 被引量:3
  • 2TCPDUMP public repository [ EB/OL ]. [ 2007 ]. http ://www. tcpdump. org/.
  • 3SHIMONISHI H, MURASE T. A network processor architecture for flexible QoS control in very high-speed line interfaces [ C ]//Proc of IEEE Workshop on High Performance Switching and Routing ( HPSR 2001 ). Dallas, Texas: IEEE Computer Society Press, 2001:402-406.
  • 4王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67
  • 5Libnids[ EB/OL]. [ 2007 ]. http ://libnids. sourceforge.net/.
  • 6JOHNSON K.Internet e-mail协议开发指南[M].北京:机械工业出版社.2000:1-144.

二级参考文献15

  • 1陈妍,李增智,廖志刚,寇雅楠.一种基于主动网络的入侵检测系统ANIDS[J].计算机工程,2005,31(2):133-134. 被引量:6
  • 2RUBINI A.等著 魏永明 骆刚 姜君译.LINUX设备驱动程序(第2版)[M].北京,中国电力出版社,2002..
  • 3White G.B.,Pooch U..Cooperating security managers:Distributed intrusion detection systems. Computers&Security,1996,15(5);441-450.
  • 4Basu A..Buch V.,Vogels W.,yon Eicken Thorsten.U-Net:A user-level network interface for parallel and distributed computing.In:Proceedings of the 15th ACM Symposium on Operating Systems Principles,Copper Mountain,Colorado,1995.
  • 5Welsh M.,Basu A.,yon Eicken T..Incorporating memory management into user-level network interfaces.Cornell University Ithaca,NY,USA:Technical Report TR97-1620,1997.
  • 6Peter J..Denning:Virtual memory.The Computer Science and Engineering Handbook,1997,1747-1760.http://cne.edu/pjd/PUBS/vm.pdf.
  • 7Jacob B.,Mudge T..Software-managed address translation.In:Proceedings of the 3rd International Symposium on High Performance Computer Architecture,San Antonio,Texas,1997.156-167.
  • 8Welsh M.,Basu A.,yon Eicken T..ATM and fast ethernetnetwork interfaces for user-level communication.In:Proceedings of the 3rd International Symposium on High Performance Computer Architecture(HPCA),San Antonio,Texas,1997,332-342.
  • 9刘炜,郑纬民,申俊,鞠大鹏.底层通信协议中内存映射机制的设计与实现[J].软件学报,1999,10(1):24-28. 被引量:5
  • 10张超,王锦田.Internet/Intranet系统上的安全技术及安全性建设原则[J].计算机应用与软件,1999,16(6):1-7. 被引量:19

共引文献68

同被引文献40

引证文献6

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部