检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:朱宏 ZHU Hong(Jilin Provincial Finance and Taxation Information Center,Changchun Jilin 130000,China)
出 处:《信息与电脑》2022年第6期224-227,共4页Information & Computer
摘 要:随着我国科学技术日新月异的不断进步,更多的网络安全问题也逐渐暴露出来。与传统的网络安全攻击方式相比,现代技术支撑下的网络安全攻击方式种类繁多,行为更加隐蔽复杂,导致网络安全攻击监测和防御工作更加困难。目前,对网络服务器的网络攻击检测方式主要通过分析网络安全日志实现,同时掌握网络服务器的实时运行情况。因此,本文提出了基于网络安全日志的网络实时分析系统,通过对网络安全日志的深度分析,确定是否受到了安全攻击,以保障整个网络环境的安全稳定运行。With the continuous progress of science and technology in our country, more network security problems are gradually exposed. Compared with the general network security attack methods, there are many types of network security attack methods supported by modern technology, and their behaviors are more subtle and complex, making it more difficult to monitor and defend network security attacks. At present, the network attack detection method on the network server is mainly realized by analyzing the network security log, and at the same time grasping the real-time operation of the network server. Therefore, this paper proposes a network real-time analysis system based on network security logs. Through in-depth analysis of network security logs, it is determined whether it has been attacked by security, so as to ensure the safe and stable operation of the entire network environment.
分 类 号:TP311.13[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.171