期刊文献+

基于集群的多源日志综合审计系统 被引量:6

Multi-source log audit system based on cluster
下载PDF
导出
摘要 随着网络规模的扩大,日志审计系统中单个日志服务器受到处理能力的限制,已经成为系统的瓶颈。采用具备高可用性和负载均衡的日志服务器集群系统来解决这个问题,提出一个基于集群的日志审计系统。分析了该系统的体系结构、总体结构模型,以及各个组成模块的功能,并给出一个综合负载统计的动态负载均衡策略。最后,用排队论的方法来分析集群系统的性能。 With the expanding of network size, the transacting capability of the single log server in log audit system is limited, which has already become the bottleneck of that system. To address this problem, a log server cluster equipped with the features of high availability and load balancing, was introduced and a log audit system based on cluster was presented. The system architecture, the structure model of the system and the main modules were described, and a dynamic load balancing algorithm with synthetic loading statistic was provided. Finally, the performance of the log server cluster system was analyzed with the queue theory.
出处 《计算机应用》 CSCD 北大核心 2008年第2期541-544,共4页 journal of Computer Applications
基金 国家863项目计划(2006AA01Z410) 国家自然科学基金资助项目(90412017)
关键词 日志审计 集群 负载均衡 排队论 log audit cluster load balancing queue theory
  • 相关文献

参考文献9

二级参考文献15

  • 1温研,王怀民,胡华平.分布式网络行为监控系统的研究与实现[J].计算机工程与科学,2005,27(10):13-16. 被引量:10
  • 2史海峰,徐涛.基于安全审计的监控系统模型的设计[J].计算机技术与发展,2006,16(4):221-223. 被引量:6
  • 3[1]anderson J P.Computer Security Threat Monitoring and Surveillance Fort Washington,James P.Anderson Co.,1980 被引量:1
  • 4[2]Matt B,Christopher W,Jeremy F.Goal-oriented Auditing and Logging IEEE Transactions on Computing Systems,1996 被引量:1
  • 5[3]Price K E.Hostbased Misuse Detection and Conventional Operating Systems audit Data Collection[Masters Thesis].Purdue University 1997-12 被引量:1
  • 6[4]Giovanni V,Inspect:A Lightweight Distributed Approach to Autom-ated Audit Trail Analysis.http://citeseer.nj.nec.com/276699.html 被引量:1
  • 7[5]Daniels T E,Spafford E H.A Network Audit System for Hostbasted Intrusion Detecti(NASHID)in Linux.Purdue University,2000 被引量:1
  • 8Shi F. Generic Algorithms for Feature Selection in an Intrusion Detection Application[D]. Mississippi State: Mississippi State University, 2000. 被引量:1
  • 9LuoJ. Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection[J]. International Jonrnal of Intelligent System, 2000, 15(8). 被引量:1
  • 10Wierzchon S T. Discriminative Power of the Receptors Activated by K-contiguous Bits Rule[J]. Journal of Computer Science and Technology, 2000, 1 (3). 被引量:1

共引文献54

同被引文献47

引证文献6

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部