期刊文献+

政务网站流量安全基线分析研究 被引量:3

Research on Web Traffic Security Baseline Analysis of Government Website
在线阅读 下载PDF
导出
摘要 随着政务云平台的建设和政务监测范围的不断扩展,采集的数据类型和数量大幅增加,如何有效地从海量数据中提取有价值的信息是重中之重.分析了政务网站监测中存在的问题,提出了网站流量数据分类方法,并基于网站流量基线分析进行网络监测预警体系建设,可以提升安全监测和运维服务体系能力,及时发现流量中存在的异常情况,提高威胁分析能力,确保监测预警的持续、有效运行. With the construction of the government cloud platform and the continuous expansion of the scope of government monitoring,the type and quantity of data collected has increased significantly.How to extract valuable information from the massive data effectively is the most important.This paper analyzes the problems existing in the monitoring of government websites,puts forward the classification method of website traffic data,and builds the network monitoring and early warning system based on the analysis of website traffic baseline.The web traffic baseline will improve the ability of security monitoring and operation and maintenance service system,discover the abnormal situation in the website traffic in time,improve the ability of threat analysis,and ensure the continuous and effective operation of monitoring and warning.
作者 蔡国庆 刘鹏 李憧 Cai Guoqing;Liu Peng;Li Chong(Beijing Government Computer Emergency Response Center,Beijing100101)
出处 《信息安全研究》 2020年第6期537-542,共6页 Journal of Information Security Research
关键词 监测预警 网络安全 基线分析 流量分析 政务网站 monitoring and early warning network security baseline analysis network traffic analysis government website
  • 相关文献

参考文献9

二级参考文献34

  • 1温世强,段海新,吴建平.网络蠕虫爆发的检测算法及其应用[J].计算机工程与设计,2005,26(5):1140-1143. 被引量:2
  • 2姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 3陈博,方滨兴,云晓春.分布式蠕虫检测和遏制方法的研究[J].通信学报,2007,28(2):9-16. 被引量:12
  • 4ZOU C C, GONG Wei-bo, TOWSLEY D. Code red worm propagation modeling and analysis [ C ]//Proc of ACM Conference on Computer and Communications Security. 2002: 138-147.
  • 5ZOU C C, GAO Li-xin, GONG Wei-bo, et al. Monitoring and early warning for Internet worms [ C ]//Proc of the 10th ACM Conference on Computer and Communication Security. Washington DC: [ s. n. ], 2003,190-199.
  • 6Degioanni L, Baldi M, Risso E et al. Profiling and Optimization of Software-based Network-analysis Applications[C]. 15^th Symposium on Computer Architecture and High Performance Computing, 2003:226-34.
  • 7X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)
  • 8Vaidya, Jaideep,Atluri, Vijayalakshmi,Warner, Janice,Guo, Qi.Role Engineering via Prioritized Subset Enumeration[J].IEEE Transactions on Dependable and Secure Computing.2010(3)
  • 9Linyuan Lü,Tao Zhou.Link prediction in weighted networks: The role of weak ties[J].EPL (Europhysics Letters).2010(1)
  • 10Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences.2005(10)

共引文献800

同被引文献18

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部