浏览全部资源
扫码关注微信
[ "鞠洪尧(1966-),男,浙江纺织服装职业技术学院教授,主要研究方向为网络性能优化、云计算、智能制造等。" ]
网络出版日期:2016-06,
纸质出版日期:2016-06-20
移动端阅览
鞠洪尧. 应用服务器群服务安全监控机制[J]. 电信科学, 2016,32(6):177-185.
Hongyao JU. Service security monitoring mechanism for application server cluster[J]. Telecommunications science, 2016, 32(6): 177-185.
鞠洪尧. 应用服务器群服务安全监控机制[J]. 电信科学, 2016,32(6):177-185. DOI: 10.11959/j.issn.1000-0801.2016173.
Hongyao JU. Service security monitoring mechanism for application server cluster[J]. Telecommunications science, 2016, 32(6): 177-185. DOI: 10.11959/j.issn.1000-0801.2016173.
应用服务器关键硬件的承载状态及应用软件自身的工作状态是网络应用系统服务安全的重要因素,通过对应用服务器中央处理器、内存、网络流量、应用软件目录、文件等监控技术的研究,将动态综合监控、安全审查、应用软件智能修复技术进行集成,构建了网络应用系统的智能监控体系架构,并阐明了实现原理和方法,解决了网络应用系统软硬件工作状态综合监控问题,实现了应用系统硬件和软件工作状态异常时自动报警、定位和应用软件遭受攻击时自动修复的目标。
For an application system,the workloads on the application servers’ key hardware and the working state of the application software are important factors affecting the system’s safety.Based on studies of the monitoring techniques for CPU,RAM,network traffic,software directories and software files of application servers,dynamic comprehensive monitoring,safety review and application software intelligent recovery were integrated,and an intelligent monitoring system was constructed for the application systems.The mechanisms and methodology of the monitoring system were illustrated.The system realized intelligent monitoring the working state of hardware and software,achieved the goal of automatic alarming,fault locating upon abnormal working states of the hardware or software and automatic recovery upon attacks to the software.
王建民 , 尹建伟 , 窦万春 . 业务过程管理技术专题前言 [J ] . 软件学报 , 2015 , 26 ( 3 ): 447 - 448 .
WANG J M , YIN J W , DOU W C . Business process management technology thematic introduction [J ] . Journal of Software , 2015 , 26 ( 3 ): 447 - 448 .
孟小峰 , 慈祥 . 大数据管理:概念、技术与挑战 [J ] . 计算机研究与发展 , 2013 , 50 ( 1 ): 146 - 169 .
MENG X F , CI X . Big data management:concepts,techniques and challenges [J ] . Journal of Computer Research and Development , 2013 , 50 ( 1 ): 146 - 169 .
王宇 . 自主可控系统安全防护技术的现状与对策 [J ] . 保密科学技术 , 2014 ( 12 ): 24 - 30 .
WANG Y . Current situation and countermeasures for independent and controllable system security technology [J ] . Secrecy Science and Technology , 2014 ( 12 ): 24 - 30 .
袁健 , 陈冬露 . 云环境中基于动态监测周期的动态资源管理模型 [J ] . 小型微型计算机系统 , 2016 , 37 ( 3 ): 474 - 478 .
YUAN J , CHEN D L . Resource management strategic model based on dynamic monitoring period in cloud environment [J ] . Journal of Chinese Computer Systems , 2016 , 37 ( 3 ): 474 - 478 .
SHI J , LI H , ZHOU L D.The technical security issues in cloud computing . International Journal of Information and Communication Technology [J ] . 2013 , 5 ( 3 - 4 ): 272 - 282 .
NWOBODO I , JAHANKHANI H , EDOH A . Security challenges in the distributed cloud computing [J ] . International Journal of Electronic Security and Digital Forensics , 2014 , 6 ( 1 ): 38 - 51 .
CHEN G , WU S , WANG Y . The evolvement of big data systems:from the perspective of an information security application [J ] . Big Data Research , 2015 , 2 ( 2 ): 65 - 73 .
王帅 , 汪来富 , 金华敏 , 等 . 网络安全分析中的大数据技术应用 [J ] . 电信科学 , 2015 , 31 ( 7 ): 139 - 144 .
WANG S , WANG L F , JIN H M , et al . Big data application in network security analysis [J ] . Telecommunications Science , 2015 , 31 ( 7 ): 139 - 144 .
胡小梅 , 刘嘉勇 . 基于DNS劫持的流量监测系统设计与实现 [J ] . 网络安全技术与应用 , 2016 ( 1 ): 110 - 112 .
HU X M , LIU J Y . Design and implementation of traffic monitoring system based on DNS [J ] . Network Security Technology & Application , 2016 ( 1 ): 110 - 112 .
MOHAIMENUZZAMAN M , RAHMAN S M M . A design pattern for real time progress monitoring of a time-intensive process in a stateless software application [J ] . International Journal of Software Engineering,Technology and Applications , 2015 , 1 ( 1 ): 53 - 63 .
CASOLA V , BENEDICTIS A D , DRAGO A , et al . SeNsiM-SEC:secure sensor networks integration to monitor rail freight transport [J ] . International Journal of System of Systems Engineering , 2013 , 4 ( 4 ): 291 - 316 .
王一川 , 马建峰 , 卢笛 , 等 . 面向云环境内部DDoS 攻击检测的博弈论优化 [J ] . 计算机研究与发展 , 2015 , 52 ( 8 ): 1873 - 1882 .
WANG Y C , MA J F , LU D , et al . Game optimization for internal DDoS attack detection in cloud computing [J ] . Journal of Computer Research and Development , 2015 , 52 ( 8 ): 1873 - 1882 .
KIM S K , . JenniferSoft:APM software development leader in Korea [J ] . International Journal of Teaching and Case Studies , 2015 , 6 ( 2 ): 95 - 107 .
JAIN M,PREETI , . Availability analysis of software rejuvenation in active/standby cluster system [J ] . International Journal of Industrial and Systems Engineering , 2015 , 19 ( 1 ): 75 - 93 .
GAUR V , SONI A . A knowledge-driven approach for specifying the requirements of multi-agent system [J ] . International Journal of Business Information Systems , 2015 , 19 ( 3 ): 300 - 323 .
CAROL S S , SHI Y . Predicting residual software fault content and their location during multi-phase functional testing using test coverage [J ] . International Journal of Reliability and Safety , 2013 , 7 ( 1 ): 32 - 57 .
0
浏览量
425
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构