提出了网络审计系统的模型,并对该模型的实现进行了研究。
After introducing a networking auditing system model, some design and implementation techniques has been discussed.
网络审计系统广泛应用于园区网络,实现园区网络内的身份认证、访问控制、日志记录以及流量计费等功能。
The network Auditing System usually used to implement the user authentication, access control, log recording and other functions such as flow charge in a large network.
本文通过建立电子网络系统的内部控制,阐述高校基建审计如何利用网络信息技术以建立电子网络审计系统。
This article mainly focuses on how to establish internal control methods on electronic network system and how to use electronic network system in college infrastructure auditing.
本文的重点是基于管理大型学术网络子网的系统管理员的真实需求而总结出的一些周期性的系统审计实践。
This article focuses specifically on the practical aspects of periodic system auditing based on real-world requirements from a system administrator of a subnet in a large academic network.
目前网络信息审计系统大多基于文本信息的过滤,但不良信息的提供者将不良信息嵌入到图像或直接以图像文件,绕过监控。
At present, network information audit system is almost based on text information filtering, but badness information is embedded into image or image file directly by badness information provider.
审计网络访问控制和安全远程访问系统。
Audit network access control and secure remote access systems.
网络集中安全审计系统的研究与应用已经成为国内外研究的热点。
The research and application of network concentration security audit system is becoming the focus of world.
网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息。
In network system there is a large amount of log audit data which contain much information related to security.
传统基于通用处理器和ASIC的解决方案无法兼顾网络信息审计系统对高性能和灵活性的要求。
Traditional system architectures based on general purpose processor and ASIC can not satisfy requirements to high performance and flexibility of network information audit system.
数据采集是网络信息审计系统的基础组件。
The part of data collection is the basis of network information audit system.
研究与开发网络安全审计系统具有重要的现实意义。
Thus it is meaningful to study and develop the network security audit system.
网格不同于传统的分布式系统,网络规模更大,结构更加复杂,对日志系统和安全审计也提出了更高的要求。
Grid is different from the distributed system, it's sweeping and its configuration is more complex, so the demand to the log system and the security audit is also higher.
审计线索不仅突出了网络上脆弱之处,而且还能识别出一次内部作业中用于入侵系统的口令和设备。
The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job.
为此,对零拷贝技术进行了研究与试验,并成功实现了该技术,从软件上满足了基于高速网络的信息审计系统的需求。
To meet the need of high-speed network information audit system, the technology of zero-copy is researched on and realized successfully.
SCADA系统的技术设备和网络的审计是至关重要的持续的安全有效性。
Technical audits of SCADA devices and networks are critical to ongoing security effectiveness.
该文在分析基于主机和基于网络的入侵检测系统的特点的基础上,提出了一种电子商务安全审计系统的设计。
This paper first analyses the characteristic of the host -based and network -based intrusion detection systems, then presents an audit system for electronic commerce system.
信息捕捉与还原技术是网络安全技术中审计系统实施的一个难点,同时也是实现审计系统的基础。
In auditing system about network security, the technology about information catching and reverting is a difficult problem. At the same time, it is also foundation problem.
对目前一些分布式安全审计系统所存在的虚报率高、单点失效、网络通信负载过重等问题进行了改进。
We focus on addressing the problems that exist in some current distributed Security Audit System, for instance, high false alerting rate and too big network communication load, etc.
计算机审计系统是对全部审计业务和审计信息进行综合管理、利用的集成计算机网络系统。
Computer-based audit system is an assembling computer Internet network, which can manage and utilize all the audit business and information.
随着网络规模的扩大,日志审计系统中单个日志服务器受到处理能力的限制,已经成为系统的瓶颈。
With the expanding of network size, the transacting capability of the single log server in log audit system is limited, which has already become the bottleneck of that system.
因此网络安全审计系统开始受到广泛的重视。
Network security auditing system catches more and more attention of the system administrators.
然后对网络信息审计系统相关技术进行了研究,分析了网络报文捕获的瓶颈,并根据实际情况对算法进行了简化。
We analyze the choke point of capture the packet in network and predigest the Boyer-Moore algorithm for current environment.
当前一些大型网络数据库管理系统(DBMS)的安全性方法主要包括:身份认证、访问控制、审计跟踪和数据备份,但对一些更为敏感和重要的数据,还需要进行数据加密或者容灾系统的设计。
The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.
所研制的这套系统采用了先进的状态检查技术,实时地对进出内部网络的电子邮件和传输文件等进行分析,并根据需要对通信内容进行审计,以及对通信连接进行控制。
It adopts advanced technology of state check, analyses the emails and files passing in and out real-time, audits the communicated content according to requirement, controls the network connects.
其次根据目前网络安全审计中存在的问题提出了基于数据挖掘的网络安全审计系统的实现方案并建立了系统模型图。
Secondly, it puts forward a solution of network security audit based on data mining and builds a system model to solve the problems existing in current network security audit.
本文在研究网络信息审计技术和文本过滤技术的基础上,设计并实现了一个基于网络信息审计的网页文本过滤系统。
On the research of network information audit techniques and text filtering, this paper designs and implements a Web text filtering system based on network information audit.
为了解决这些问题,本文提出了基于数据挖掘的网络安全审计系统的方案并加以实现。
In order to solve these problems, the dissertation works out a scheme of the network security audit based on data mining and realizes it.
设计和实现了一个基于B/S&C/S混合模式的网络日志监控与安全审计系统原型,并对原型系统在实际应用环境中采集到的日志数据进行安全审计与分析。
The prototype of LSSAS in network based on B / S& C/ S mixing mode is designed and implemented, and the log data collected by prototype system in the applied environment are analyzed and audited.
第六部分说明了网络内容安全审计的意义,并详细介绍了已实现的内容安全审计系统的总体框架和功能。
In chapter VI, the significance of Internet content security auditing was described and the overall framework and functions of the ICSA (Internet content security auditing) system were introduced.
应用结果表明,系统既实现了局域网络的安全审计功能,又为局域网络采取进一步的安全措施提供了依据,并且具有较好的可移植性。
Application results show that this system achieves the security audit function of LAN and provides basis for taking more security measures. Besides, it possesses good transportability.
应用推荐