期刊文献+

网络访问日志

Network Access Log
下载PDF
导出
摘要 通过识别网络上异常的网络流量可以确定系统的位置来源,而要找出产生这些流量的应用或使用者却并不容易。因为可能许多用户使用过这些网系统,并且特洛伊木马可能已经在网络中传播和进行繁殖。网络访问审计日志将系统事件日志与网络监控结合起来,通过对网络传输的记录扩展了主机的原本的日志信息,从而提高了内部网的网络安全。 An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated.From a forensic point of view it is almost impossible to positively identify the application or the user behind the application that generated the traffic.Many users may have been using the networked system and there remains the possibility of network traffic generation by Trojan horses.We propose a network-access log that bridges the gap between system event logs and network monitoring by extending event logging on individual hosts with information pertaining to generation of network traffic.The key contribution of the proposed network access audit log is the establishment of the chain of evidence linking the outgoing traffic to its source thereby improving the network security of an intranet.
作者 王礼赞
出处 《电脑知识与技术(过刊)》 2009年第8X期6403-6405,共3页 Computer Knowledge and Technology
关键词 事件日志 网络监控 网络取证 event Log network monitoring network forensics
  • 相关文献

参考文献3

二级参考文献12

  • 1张树兵 戴红 等.Visual Basic6.0入门与提高[M].北京:清华大学出版社,2000..
  • 2H Burch,B Cheswick.Tracing Anonymous Packets to Their Approximate Source[C].In:Proc USENIX LISA'00 , New Orleans,USA,2000: 313-321.
  • 3J Black,S Halevi,H Krawczyk.UMAC:Fast and Secure Message Authentication[J].Lecture Notes in Computer Science, 1999; 1666:216-233.
  • 4Alex C Snoeren, Craig Partridge, Luis A.Sanche.Single-Packet IP Traceback[J].IEEE/ACM Transactions on Networking(ToN),2002;10: 1-2,4-7.
  • 5Steven Bellovin,Marcus Leech,Tom Taylor.ICMP Traceback Message the IETF ICMP Traceback[S].Internet Draft:draft-bellovin-itrace-00. txt, submitted 2000-03, expiration date, 2000-09: 1-4.
  • 6MICROSOFT CORPORATION.Stop OA in Tcpip.sys when receiving out of band (OOB)Data.http ://support.microsoft.com/default.aspx? scid=kb; en-us : 143478.
  • 7Ference Boden. A Fast APRIORI Implementation[C]. Proceeding of the IEEE ICDM Workshop on Frequent Itemset Mining Implementations. 2003.
  • 8Christian Borgeh. Efficient Implementations of Apriori and Eclat [C]. Proceeding of the IEEE ICDM Workshop on Frequent Itemset Mining Implementations. 2003.
  • 9徐兴元,傅和平,熊中朝.基于数据挖掘的入侵检测技术研究[J].微计算机信息,2007,23(03X):74-75. 被引量:17
  • 10Nathan Wallee.中文Windows98技术内幕[M].机械工业出版社,2000..

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部