全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

IDC安全态势感知系统研究与应用
Research and Application of IDC Security Situation Awareness System

DOI: 10.12677/CSA.2019.98181, PP. 1611-1624

Keywords: IDC,信息安全,IP检测,关键词过滤,报表统计
IDC
, Information Security, IP Detection, Keyword Filtering, Report Statistics

Full-Text   Cite this paper   Add to My Lib

Abstract:

IDC机房时刻承担着处理海量数据信息的重任,及时发现和处理其中的安全隐患具有十分重要的意义。针对数据中心安全防范意识欠缺、管理工作不到位、违法违规信息顽固存在以及日志信息无迹可寻等安全问题,本文设计并实现了一款IDC安全态势感知系统,实现了对异常设备信息和IP信息的预警以及违法违规信息的统计。首先提出了系统的整体解决方案,对系统的整体架构、逻辑架构、功能模块以及结构单元进行设计,随后描述其各个功能的具体实现方式,最后对系统进行了完备的测试工作,验证了系统的切实可行,现已投入实际应用中。
IDC equipment room is responsible for handling the massive data information at all times, and it is of great significance to discover and deal with the hidden dangers in time. In view of the lack of security awareness in data center, the lack of management work, the stubborn existence of illegal and illegal information, and the lack of trace information, this paper designs and implements an IDC security situational awareness system, which implements the early warning of abnormal device information and IP and statistics of illegal and illegal information. Firstly, the overall solution of the system is proposed. The overall architecture, logical architecture, functional modules and structural units of the system are designed. Then the specific implementation methods of each function are described. Finally, the system is fully tested and the feasibility of the system is verified, it has been put into practical use.

References

[1]  唐建军. IDC/ISP信息安全管理系统融合建设研究及应用[J]. 中国新通信, 2017, 19(19): 118-119.
[2]  胡海波. 国外IDC信息安全管理形成标准我国相关技术评测手段已不断完善[J]. 世界电信, 2013, 26(4): 57-60.
[3]  陈嘉宁. 基于主成分分析和蚁群优化方法对IP流进行网络异常检测[J]. 计算机测量与控制, 2018, 26(5): 188-192.
[4]  吴小花, 何晓报, 赵东卓. 基于频繁IP地址异常流检测[J]. 长春工业大学学报(自然科学版), 2012, 33(6): 625-628.
[5]  李振国, 郑惠中. 网络流量采集方法研究综述[J]. 吉林大学学报(信息科学版), 2014, 32(1): 70-75.
[6]  Wan, D. and Cao, M.H. (2009) Information Security Management System of IDC Based on ISO27001. Information Security & Communications Privacy.
[7]  Wang, H.Y. (2015) Information Security Services: Cornerstone of Network Operation in the M-ICT Era. ZTE Technologies, No. 6, 23-24.
[8]  杨志文, 刘波. 基于Hadoop平台协同过滤推荐算法[J]. 计算机系统应用, 2013, 22(7): 108-112.
[9]  黄德才, 陈欢. Hadoop平台下海量数据排行榜过滤算法[J]. 计算机系统应用, 2012, 21(3): 111-115.
[10]  Riyaz, P.A. and Varghese, S.M. (2016) A Scalable Product Recommendations Using Collaborative Filtering in Hadoop for Bigdata. Procedia Technology, 24, 1393-1399.
https://doi.org/10.1016/j.protcy.2016.05.159
[11]  Cai, L., Guan, X., Chi, P., et al. (2015) Big Data Visualization Collaborative Filtering Algorithm Based on RHadoop. International Journal of Distributed Sensor Networks, 11, 1-9.
https://doi.org/10.1155/2015/271253
[12]  Liu, S.Q. and Min, Q.I. (2016) Research and Implementation of Hadoop-Based Social Big Data Collaborative Filtering Personalized Recommendation. Modern Computer, 32, 74-78.
[13]  潘富斌. 基于Hadoop的安全云存储系统研究与实现[D]: [硕士学位论文]. 成都: 电子科技大学, 2013.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133