期刊文献+

信息采集网络支撑系统的设计与实现 被引量:5

Design and Implementation of Network Supporting System for Information Acquisition
下载PDF
导出
摘要 基于网络数据帧转发原理,提出了一种端口镜像设计方法,并实际部署了一个独立于生产网络的、可精确筛选的、多输出的网络流量镜像系统,为厦门大学多套网络信息采集分析系统提供网络支撑. Based on principles of network data frame forwarding,a design technique of port mirroring is proposed.An accurate filtering multiple-output network traffic mirrored system, which is independent of production network, is deployed to provide the network support for the Xiamen University network information acquisition and analysis system.
出处 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2016年第3期426-433,共8页 Journal of Xiamen University:Natural Science
基金 2015年福建省中青年教师教育科研项目(高校教育信息化专项)(JA15002)
关键词 网络安全 信息采集 端口镜像 network security information acquisition port mirroring
  • 相关文献

参考文献7

  • 1肖寅东,王厚军,田书林.高速网络入侵检测系统中包头解析方法[J].仪器仪表学报,2012,33(6):1414-1419. 被引量:10
  • 2CISCO. Configuring traffic mirroring[EB/OL].[2015-Q3-16]. http: // www. cisco, com/c/en/us/td/docs/routers/asr9000/software/asr9k - r5-l/interfaces/configuration/guide/hc51 xasr9kbook/hc51 span. html.
  • 3H3C.网络管理和监控配置[EB/OL].[2015-03-16].http:// www. h3c. com. cn/Service/Document _ Center/Switches/Catalog/S5800/S5800/Configure/Operation _Manual/H3C_ S5820X [ S5800 ] _ CORelease _ 1110-6W103/10/.
  • 4唐晓兰,刘中临,刘嘉勇.一种基于知识库的行为特征检测模型[J].信息安全与通信保密,2012,10(2):51-53. 被引量:6
  • 5任富新.高速网络流量监测系统的设计与实现[J].微型机与应用,2012,31(1):58-60. 被引量:3
  • 6CHARLES H.IETF RFC 894: a standard for the trans-mission of IP datagrams over ethernet networks[S/OL].[2013-03-02].http: datatracker.ietf.org/doc/rfc894/.
  • 7Postel J.IETF RFC 1042: a standard for the transmissionof IP datagrams over IEEE 802 networks[S/OL].[2013-03-02].http: //datatracker.ietf.org/doc/rfcl042/.

二级参考文献25

  • 1王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67
  • 2曾宪玮,裴昌幸,朱畅华,易运晖.基于ARM的分布式网络测量探针的设计与实现[J].仪器仪表学报,2007,28(5):784-787. 被引量:3
  • 3林青家,陈涤,刘允才.网络流量的小尺度特性分析[J].电子测量与仪器学报,2007,21(3):92-97. 被引量:7
  • 4陈敏,李旺.计算机网络中的故障定位技术研究[J].国外电子测量技术,2007,26(7):8-11. 被引量:7
  • 5KOTSIANTIS S, KANELLOPOULOS D, PINTELAS P. Data preprocessing for supervised learning [J]. Interna- tional Journal of Computer Science ,2006,1 : 111-117.
  • 6FUSCO F, DERI L. High speed network traffic analysis with commodity multi-core systems [ C ]. Proceedings of the 10th Annual Conference on Internet Measurement, New York, USA,2010.
  • 7MUNZ G, LI S, CARLE G. Traffic anomaly detection using k-means clustering[ C]. GI/ITG Workshop MMB- net, Hamburg, Germany,2007 : 8.
  • 8WANG Z Q, WANG X Y. NetFlow based intrusion de- tection system [ C ]. Proceedings of the 2008 International Conference on MultiMedia and Information Technology, Washington, DC, USA,2008:825-828.
  • 9PATI S, NARAYANAN R, MEMIK G, et al. Design and Implementation of an FPGA Architecture for High- Speed Network Feature Extraction [ C ]. International Conference on Field-Programmable Technology, Kitakyu- shu, Japan,2007.
  • 10KOBIERSKY P, KORENEK J, POLCAK L. Packet header analysis and field extraction for multigigabit net- works [ C ]. Proceedings of the 2009 12th International Symposium on Design and Diagnostics of Electronic Cir- cuits & Systems. Washington, DC, USA,2009:96-101.

共引文献16

同被引文献56

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部