期刊文献+

基于事件流的IT资源监控系统

Development of IT Resources Monitoring System Based on Event flow
下载PDF
导出
摘要 通过引入esper开源事件流处理引擎,成功地解决了传统基于数据库和内存的实时监控事件处理所遇到的资源占用大、操作频繁问题。详细讨论了基于事件流的IT资源监控系统设计思路,并给出了系统技术架构方案。该方案充分利用了esper事件流处理引擎,为IT资源监控系统的事件处理提供了一种新途径。 Using the esper open source event flow as processing engine,it obtains the successful solution to a large footprint,operating frequent in real-time monitoring event processing encountered based on the traditional memory and database.It shows detail about the design ideas to monitor and control the event flow IT resources,establishes the technology infrastructure system.This new approach takes full advantage of the esper event flow processing engine for IT resources,monitoring and control system of the event processing.
出处 《机械设计与制造工程》 2012年第A07期18-19,24,共3页 Machine Design and Manufacturing Engineering
关键词 监控 事件流 esper Monitoring Event Flow Esper
  • 相关文献

参考文献3

二级参考文献16

  • 1[1]Valdes A,Skinner K.Probabilistic Alert Correlation[A].Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001)[C],2001:54-68
  • 2[2]Dain O,Cunningham R K.Fusing a Heterogeneous Alert Stream into Scenarios[A].Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications[C],2001:1-13
  • 3[3]Debar H,WespiA.Aggregation and Correlation of Intrusion-Detection Alerts.In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection(RAID).2001.number 2212 in Lecture Notes in Computer Sciences,pages 85-103,Davis,CA,USA,October 2001.Springer
  • 4[4]Guofei Jiang,Member,IEEE and George Cybenko,Fellow,IEEE.temporal and Spatial distributed Event correlation for Network Security.Proceeding of the 2004 American Control conference Boston,Massachusetts June 30.July2,2004
  • 5[5]Ning P,Cui Y,Reeves D S.Constructing attack scenarios through correlation of intrusion alerts.presented at Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22 2002,Washington,DC,United States,2002
  • 6[6]Ning P,Xu D.Learning attack strategies from intrusion alerts.presented at Proceedings of the 10th ACM Conference on Computer and Communications Security,CCS 2003,Oct 27-31 2003,Washington,DC,United States,2003
  • 7[7]Ning P,Cui Y Reeves D S,et al.D.Xu,Techniques and tools for analyzing intrusion alerts.ACM Transactions on Information and System Security,2004;7:274
  • 8[8]Ning P,Xu D.Alert correlation through triggering events and common resources.Tucson,AZ,USA,2004
  • 9[9]Jakobson G,Lemmon A,Weissman M.Knowledge-based GUI for network surveillance and fault analysis.presented at Proceedings of NOMS '94-IEEE Network Operations and Management Symposium,14-18 Feb.1994,Kissimmee,FL,USA,1994
  • 10[10]Jakobson G,Weissman M,Brenner L,et al.C.GRACE:building next generation event correlation services.presented at NOMS 2000:IEEE/IFIP Network Operations and Management Symposium 'The Networked Planet:Management Beyond 2000',Apr 10-Apr 14 2000,Honolulu,HI,USA,2000

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部