- 1、本文档共6页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A SCALABLE NETWORK THREAT WARING SYSTEM ARCHITECTURE OF THE PLATFORM
A SCALABLE NETWORK THREAT WARING SYSTEM
ARCHITECTURE OF THE PLATFORM
Zhang Lijuan
Electronic and communication engineering, Shenzhen Polytechnic, china 518055
Keywords: network monitoring data anomaly detection of network threat warning
Abstract: in this paper, based on the SOA design of a large-scale network monitoring
data for anomaly detection and alarm system architecture, focusing on the anomaly
detection model and network threat early warning model to do an in-depth study and
analysis.
1. Introduction
With the construction of IT system continue to expand the scale and the rapid
popularization of Internet, the security of IT system management becomes more and
more complex. Network traffic anomaly monitoring is an important part of IT
network monitoring, the anomaly traffic detection and analysis, the user can timely
discover network abnormal, so as to take effective measures to solve the. The current
network traffic monitoring using flow threshold approach, namely the network
administrator to set the system flow rate threshold, when the flow exceeds the
threshold is generated when the threat warning. Such a system alarm depends entirely
on the threshold level, the probability of false alarm is very large. Therefore, more
effective network traffic anomaly detection model for system security management is
very necessary. According to enterprise internal network to recommend a set of
effective and targeted network traffic anomaly detection model, this model can
effectively detect the internal abnormal condition.
2. the overall plan and architecture
Network threat warning platform is based on an SOA network threat monitoring
data computing system, as shown in figure. Monitoring data is computed for
each of the activities are regarded as a Web service, Web service provides
data preprocessing, data association analysis, visual analysis and security
screening function; based on user needs, can be dynamically based on WEB
servic
您可能关注的文档
- 2014年11月雅思写作机经(A类、G类).pdf
- 2014届北京朝阳高三上期末英语(word解析).doc
- 2014年6月15日托福口语真题及答案解析.doc
- 2014年12月13日雅思写作考题预测.pdf
- 2014年5月雅思口语预测.pdf
- 2014年6月大学英语四级(CET4)新题型预测选词填空题型-17526.pdf
- 2013新版八年级上同步知识讲解 unit-1Where did you go on vacation 学生版.doc
- 2014年6月大学英语四级考试真题试题二 - 备考族.pdf
- 2014年7月-9月雅思G类写作预测及解题思路.pdf
- 2014年8年级上期末英语试题.pdf
文档评论(0)