复杂网络环境下网络安全日志实时分析方案研究  被引量:3

Research on Real-time Analysis Scheme of Network Security Log in Complex Network Environment

在线阅读下载全文

作  者:朱宏 ZHU Hong(Jilin Provincial Finance and Taxation Information Center,Changchun Jilin 130000,China)

机构地区:[1]吉林省财税信息中心,吉林长春130000

出  处:《信息与电脑》2022年第6期224-227,共4页Information & Computer

摘  要:随着我国科学技术日新月异的不断进步,更多的网络安全问题也逐渐暴露出来。与传统的网络安全攻击方式相比,现代技术支撑下的网络安全攻击方式种类繁多,行为更加隐蔽复杂,导致网络安全攻击监测和防御工作更加困难。目前,对网络服务器的网络攻击检测方式主要通过分析网络安全日志实现,同时掌握网络服务器的实时运行情况。因此,本文提出了基于网络安全日志的网络实时分析系统,通过对网络安全日志的深度分析,确定是否受到了安全攻击,以保障整个网络环境的安全稳定运行。With the continuous progress of science and technology in our country, more network security problems are gradually exposed. Compared with the general network security attack methods, there are many types of network security attack methods supported by modern technology, and their behaviors are more subtle and complex, making it more difficult to monitor and defend network security attacks. At present, the network attack detection method on the network server is mainly realized by analyzing the network security log, and at the same time grasping the real-time operation of the network server. Therefore, this paper proposes a network real-time analysis system based on network security logs. Through in-depth analysis of network security logs, it is determined whether it has been attacked by security, so as to ensure the safe and stable operation of the entire network environment.

关 键 词:网络安全 网络日志 攻击检测 

分 类 号:TP311.13[自动化与计算机技术—计算机软件与理论]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象