期刊文献+

日志采集归并技术在电力安全管理中的应用 被引量:1

Application of the Log Collection and Merging Technology to Electricity Security Management
在线阅读 下载PDF
导出
摘要 电力二次系统安全防护工作开展以来,各级电网调度中心和变电站部署了大量的安全设备和系统,为实现安全设备运行状态检测,需采集并存储大量详实的运行数据。文章在分析电力二次系统安全管理中日志采集架构的基础上,提出了消息路径的日志采集技术,并通过基于任务池、缓冲池的多级归并技术,提高了日志处理速度,完成海量数据的归并入库。实践证明该技术能高效地处理海量多源异构数据。 With the implementation of security protection for power secondary systems, grid dispatching centers and transformer substations of different levels have installed abundant security devices and systems. To detect operation condition of security equipments, there is a need to collect and store substantial and precise operation log data. After analyzing the log collection framework for the security management of power secondary systems, this paper puts forward to a log collection technology using message paths, speeds up log processing and completes merging and storage of mass data by using a multi-level merging technology based on task pool and buffer pool. Practice shows that the proposed technique can efficiently process mass, multi-source and heterogeneous data.
出处 《电力信息化》 2013年第4期46-50,共5页 Electric Power Information Technology
关键词 日志采集 消息路径 多级归并 电力二次系统 安全管理 log collection message path multi-level merging power secondary system security management
  • 相关文献

参考文献3

  • 1蒋元晨,李东辉.二次安防体系下基于调度々业应用的二次安全监管系统[c]//2004全国电力系统自动化学术交流研讨大会论文集.2004.
  • 2陈玉慧,蒋元晨.电力二次系统日志集中管理的探讨和研究.第二十九届中国电网调度运行会收录论文全集2005:565-570页.
  • 3李承,王伟钊,程立,汪为农,李家滨.基于防火墙日志的网络安全审计系统研究与实现[J].计算机工程,2002,28(6):17-19. 被引量:35

二级参考文献5

  • 1[1]anderson J P.Computer Security Threat Monitoring and Surveillance Fort Washington,James P.Anderson Co.,1980
  • 2[2]Matt B,Christopher W,Jeremy F.Goal-oriented Auditing and Logging IEEE Transactions on Computing Systems,1996
  • 3[3]Price K E.Hostbased Misuse Detection and Conventional Operating Systems audit Data Collection[Masters Thesis].Purdue University 1997-12
  • 4[4]Giovanni V,Inspect:A Lightweight Distributed Approach to Autom-ated Audit Trail Analysis.http://citeseer.nj.nec.com/276699.html
  • 5[5]Daniels T E,Spafford E H.A Network Audit System for Hostbasted Intrusion Detecti(NASHID)in Linux.Purdue University,2000

共引文献35

同被引文献9

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部