The Research of Data Stream Technology in Computer Network Security Monitoring

被引:0
|
作者
Li Li [1 ]
Hu ZhiYu [1 ]
机构
[1] Jingdezhen Univ, Jingdezhen 333000, Jiangxi, Peoples R China
来源
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING | 2015年 / 121卷
关键词
Network Security Monitoring; Data Stream; Network Event; INTRUSION DETECTION; SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network attack in a wide range of complex and require monitoring system can real-time detection under high-speed network traffic found various security events. Data stream management system is a kind of high speed and large flow data stream of the real-time response to query requests database model. In this paper, the flow of data in computer network security monitoring technology carried out research. Data stream management platform effectively support real-time query and analysis of the high-speed network data flow, and based on the network security event monitoring system can achieve high processing performance. Put forward a data stream technique is applied to the network security event monitoring framework model can accurately describe the security event in the rules and various monitoring queries, strong flexibility and integrity. In addition, the system can integrate intrusion detection, worms found, network traffic management and so on a variety of monitoring capability, has a good scalability.
引用
收藏
页码:1904 / 1907
页数:4
相关论文
共 50 条
  • [1] Research on Data Stream Technology in Computer Network Security Monitoring
    Xiong Wei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1978 - 1981
  • [2] The research on Data Flow Technology in Computer Network Security Monitoring
    Yin XiaoHong
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 787 - 789
  • [3] Research on Computer Network Security Based on Data Encryption Technology
    Zhang, Yicong
    Zhou, Shujun
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
  • [4] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [5] Research of Computer Network Security Technology
    Tan, Juan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 736 - 740
  • [6] Research on computer network data security storage technology in the era of big data
    Zhang, Liying
    Gu, Xin
    Zhao, Qiang
    REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2024, 40 (02):
  • [7] Research on the Application of Data Encryption Technology in Computer Network Communication Security
    Xia, Kuiliang
    Song, Xiaoming
    2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020), 2020, : 164 - 167
  • [8] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 436 - 439
  • [9] Research on Applications of Data Encryption Technology in Security of Computer Network Communication
    Li, Na
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 136 - 139
  • [10] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    MODERN COMPUTER SCIENCE AND APPLICATIONS II (MCSA 2017), 2017, : 13 - 18