期刊文献+

基于用户行为的网络管理模型能力分析 被引量:3

Analysis on Capacity of Network Management Based on User Behavior Model
下载PDF
导出
摘要 现有的网络管理模型一般都侧重网络设备本身的管理,不太适应现在越来越复杂的网络管理。基于用户行为的网络管理模型从用户行为管理的角度出发,关联分析出网络中的用户行为,并根据用户行为管理策略规范用户的网络行为,从而消除不良网络行为对网络性能和安全的影响,使网络能安全稳定地运行,并可大幅度减轻网络管理员的负担。本文讨论基于用户行为的网络管理模型要解决的关键问题,提出并分析模型应具备的4个能力:感知能力、控制能力、取证能力和告知能力,最后讨论它们在实际网络管理中的应用情况,并证明它们的可用性。 Existing network management models generally focus on the management of network device itself,it is unlikely to adapt to present the increasingly complex network management.Based on user behavior model from the user's point of view,this paper analyzes network related user behavior,and manages the user behavior based on the strategies of the user's standard network behavior management.Thereby eliminates the undesirable network behavior on the network performance and security implications,so that network can be safe and stable manner,and significantly reduce the network administrator's burden.This paper discusses the key issues of the network management based on user behavior model,and presents and analyzes the model should have four capabilities: sensing capability,control capabilities,the ability of evidence and the capacity of inform.Finally discusses their practical network management application,and proves their availability.
出处 《计算机与现代化》 2010年第8期194-197,202,共5页 Computer and Modernization
关键词 网络管理模型 网络行为 网络安全 园区网 模型能力分析 network management model network behavior network security campus network model capability analysis
  • 相关文献

参考文献6

二级参考文献81

  • 1刘宇,张成洪.企业门户中的信息与应用整合方法[J].合肥工业大学学报(自然科学版),2003,26(z1):928-932. 被引量:7
  • 2刘超,谢宝陵,祝伟玲,徐国明,刘万立.基于数据融合模型的网络安全分析评估系统[J].计算机工程,2005,31(13):140-141. 被引量:7
  • 3晏玉兰,熊璋,吴晶,王萍.企业门户Web资源整合及其实现的研究[J].计算机应用研究,2006,23(9):224-227. 被引量:2
  • 4[1]Tim B. Multisensor data fusion for next generation distributed intrusion detection systems[A]. 1999 IRIS National Symposium on Sensor and Data Fusion, Laurel,USA,1999.
  • 5[2]Tim B. Intrusion systems and multisensor data fusion: creating cyberspace situational awareness[J]. Communications of the ACM, 2000, 43(4): 99~105.
  • 6[3]Martin R, Chris G.Snort users manual, Snort release 2.0.0[EB/OL].http://www.snort.org/docs/SnortUsersManual.pdf,2002-07-06.
  • 7[4]Tim B, Roger R. Defense-in-depth revisited:qualitative risk analysis methodology for complex network-centric operations[EB/OL].http://www.silkroad.com/papers/pdf/archives/defense-in-depth-revisited-original.pdf,2002-07-23.
  • 8[5]Honeynet Project.Know your enemy: statistics[EB/OL].http://www.HoneyNet.org/papers/stats/, 2001-07-22.
  • 9Edward Wilding,Sweet & Maxwell.Computer evidence:a forensic investigations handbook[Z].Computer Fraud & Security,January 1997,Elsevier Ltd.
  • 10Marcus Ranum.Network flight recorder[EB/OL].http://www.ranum.com.

共引文献200

同被引文献20

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部