期刊文献+

基于J2EE的网络信息安全监测系统设计与实现 被引量:8

Design and implementation of network information security monitoring system based on J2EE
原文传递
导出
摘要 针对目前网络信息安全监控存在着联合分析能力和响应、处理能力薄弱以及监测广度与深度不足的问题,文中基于J2EE技术设计和实现了一种网络信息安全监测系统。该系统的数据层使用WebService和Oracle10g数据库搜集、存储网络日志,并通过SOAP和SSL进行数据交换、通信与加密;使用J2EE平台实现数据分析服务;使用Flex实现跨平台展示。软硬件实现和测试结果表明,所提出的系统能快速响应各种网络安全攻击事件,提高了网络信息安全监测的工作效率和工作水平,且降低了网络运行的风险及成本。 In view of the current network information security monitoring there is a joint analysis of the ability and response,processing capacity is weak and the lack of monitoring breadth and depth,based on J2EE technology design and implementation of a network information security monitoring system.The data layer of the system uses Web Service and Oracle10 g database to collect and store network logs,exchange data,communicate and encrypt data through SOAP and SSL,implement data analysis service using J2EE platform,and display cross-platform using Flex.The hardware and software implementation and test results show that the proposed system can respond quickly to various network security attacks,improve the work efficiency and work level of network information security monitoring,and reduce the risk and cost of network operation.
作者 黄维 HUANG Wei(Baoji Vocational and Technical College, Shanxi Baoji, 721013)
出处 《自动化与仪器仪表》 2018年第5期145-147,共3页 Automation & Instrumentation
关键词 计算机网络 信息安全 J2EE 数据采集 安全攻击 安全监测 Network information security J2EE data acquisition security attack security monitoring
  • 相关文献

参考文献13

二级参考文献102

  • 1蒋志.新时期高校信息化建设的机遇与挑战[J].出版与印刷,2012(3):47-49. 被引量:4
  • 2张雪松,徐小琳,李青山.算法生成恶意域名的实时检测[J].现代电信科技,2013,43(7):3-8. 被引量:1
  • 3彭沙沙,张红梅,卞东亮.计算机网络安全分析研究[J].现代电子技术,2012,35(4):109-112. 被引量:133
  • 4戴建华,尹华伟,张洪均,吴令安.混沌在信息加密中的应用[J].科学通报,1996,41(5):402-405. 被引量:12
  • 5BAPTISTA M S. Cryptography with chaos[J].{H}Physics Letters A,1998.50-54.
  • 6ZAMBOMI D,SPAFFORD E H. A framework and protocol for a distributed intrusion detection system[M].MA USA:IEEE Technical Report,1998.
  • 7江龙才.电网企业信息安全防护体系研究与应用[C].合肥:安徽宵电机工程学会第一届电力安全论坛,2008.
  • 8Chi-Chun Lo,Wan-Jia Chen.A hybrid information security risk assessment procedure considering interdependences between controls[J]. Expert Systems With Applications . 2011 (1)
  • 9Thomas L. Saaty.Rank from comparisons and from ratings in the analytic hierarchy/network processes[J]. European Journal of Operational Research . 2004 (2)
  • 10Hwang C L,Yoon K.Multiple Attribute Decision Making-Methods and Applications. Journal of Women s Health . 1981

共引文献90

同被引文献64

引证文献8

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部