期刊文献+

基于用户体验的信息系统主动运维平台 被引量:4

Active Operation and Maintenance Platform for Information System Based on User Experience
下载PDF
导出
摘要 传统的运维监控只是监控系统各个组件的健康工作情况,对用户级体验的细粒度监控尚缺乏有效手段。针对此问题,研究基于用户体验的信息系统主动运维平台,从业务的网络流量大数据分析出发,提出监测用户网络行为及其体验耗时。系统实施的关键在于实时识别用户的行为,测量每个行为的具体响应时间,监测用户级应用的性能。测试表明,该平台实现了预期的功能,系统吞吐率较高,内存占用较少,实现了用户应用级性能实时监测,为提高用户体验提供了有效手段。 The traditional monitoring maintenance system only watches the running metrics. However, these metrics is not sufficient to reflect the status of the whole system for fine-grained monitoring of the system at users and application level. An active operation and maintenance platform based on user experiences was proposed. Through the mining of big network data, the platform can recognize a variety of user behaviors, and measure the user experience time along with the system performance at user's level. Tests and experiments show that the platform works well with large throughput and low memory occupation. The application level performance monitoring, which provides an efficient way to improve user experience, was realized.
出处 《电信科学》 北大核心 2015年第3期124-129,共6页 Telecommunications Science
关键词 系统监控 性能 用户体验 主动运维 system monitoring, pertbrmance, user experience, active operation and maintenance
  • 相关文献

参考文献10

  • 1Chen Y, Mahajan R, Sridharan B, et al. A provider-side view of web search response time. Proceedings of the ACM SIGCOMM, Hong Kong, China, 2013:243-254.
  • 2Cherkasova L, Gardner R. Measuring CPU overhead for I/O processing in the Xen virtual machine monitor. Proceeding of USEN1X Annual Technical Conference, Boston, MA, USA, 2005: 387-390.
  • 3Hassidim A, Raz D, Segalov M, et al. Network utilization: the flow view. Proceedings of IEEE INFOCOM, Turin,Italy, 2013: 1429-1437.
  • 4Meyer T, Wohlfart F, Raumer D, et al. Measurement and simulation of high-performance packet processing in software touters. Proceedings of Leistungs-, Zuverlasigkeits- und Verlasslichkeitsbewertung yon Kommunikationsnetzen und Verteilten Systemen, G1/ITG-Workshop MMBnet, 2013.
  • 5Balachandran A, Voelker G M, Bahl P, et al. Characterizing user behavior and network performance in a public wireless LAN. ACM SIGMETRICS Performance Evaluation Review, 2002, 30(1): 195-205.
  • 6Li H, Hu C C. ROOM: rule organized optimal matching for fine-grained traffic identification. Proceedings of IEEE INFOCOM, Turin, Italy, 2013.
  • 7吴舜,苏丹,吴佳,李坤,许大卫,刘昀,魏征.基于Tilera平台的网络细粒度应用行为识别[J].电信科学,2013,29(11):94-98. 被引量:5
  • 8朱凯,张超,张凯,李文璟,孟洛明.基于TCP数据包层分析的移动互联网用户体验的评估方法[J].北京邮电大学学报,2014,37(S1):40-45. 被引量:4
  • 9Viswanath B, Bashir M A, Crovella M, et al. Towards detecting anomalous user behavior in online social networks. Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 2014.
  • 10Barford P, Plonka D. Characteristics of network traffic flow anomalies. Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, San Francis:o, USA, 2001:69-73.

二级参考文献15

  • 1Paxson V. Bro: a system for detecting network intruders in real-time. Computer Networks, 1999, 31(23/24): 2435-2463.
  • 2Pang R, Paxson V, Sommer R, et ol. Binpac: a yacc for writing application protocol parsers. Proceedings of ACM IMC, Florida, USA, 2006.
  • 3Li Z C, Xia G, Gao H Y, et al. NetShield: massive semantics-based vulnerability signature matching for high-speed networks. Proceedings of the ACM SIGCOMM, New Delhi, India, 2010.
  • 4Li H, Hu C C. ROOM: rule organized optimal matching for fine-grained traffic identification. IEEE INFOCOM 2013 Mini-Conference, Turin, Italy, Apr 2013.
  • 5Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 series ISR. http://www.cisco.eom/en/US/ prod/collateral/routers/ps5853/ps5875/product data sheet0900aecd 806c4e2a_ps2641 _Products_Data_Sheet .html,2009.
  • 6烽火网络F-enginePL系列DPI产品.http://www.fhn.com.cn/product/listpr016/422.html,2011.
  • 7RadwareANS G系列产品.http://www.radware.com/Products/ApplicationNetworkSecurity/default.aspx,2013.
  • 8Snort: an open source network intrusion prevention and detection system, 2010.
  • 9OpenDPI. http://opendpi.org, 2010.
  • 10PACE: network analysis with layer-7 deep packet inspection, 2011.

共引文献6

同被引文献40

引证文献4

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部