期刊文献+

并行电子邮件监听代理的负载均衡算法 被引量:3

Study of Parallel Email Monitoring Agent Load Balancing Algorithm
下载PDF
导出
摘要 提出了并行电子邮件监听代理的负载均衡算法 .该算法给每个代理设置了一个代理编号接受区间 ,通过对数据包的源/目的IP地址和端口号做散列 (Hash)运算 ,把IP数据包映射到某个代理编号子区间内 ;按照代理的处理能力和负载调节各个代理编号子区间的宽度 ,从而合理分配各个代理上的网络流量 ,做到充分利用所有监听代理的计算资源 .通过理论分析和实验结果表明 ,该算法在高带宽环境中有较高的效率 ,它不仅可用在邮件实时审计系统中 ,也适用于高带宽的入侵检测系统(IDS) Email application plays an important role in the information transfer, and there are more and more requirements for auto Email content auditing. A novel algorithm of load balancing among parallel Email-monitoring agents is introduced to improve the Email reconstructing success probability. This algorithm is adopted to hash the source/destination IP address and port number in packet, to map the corresponding packet to scope of the agent's number, and to adjust sizes of the scope according to the performance and load of each agent. Theoretic analysis and experiments demonstrate that the algorithm can dispatch packets reasonably and utilize all the agents' sources effectively. The algorithm can also be used for the other applications, such as IDS design, firewall design, etc..
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2003年第4期372-374,379,共4页 Journal of Xi'an Jiaotong University
基金 国家信息化计算机网络与信息安全基金资助项目 (2 0 0 1 研 1 0 10 )
关键词 电子邮件 信息审计 代理 负载均衡 Agents Data privacy Data processing Data structures Monitoring
  • 相关文献

参考文献4

二级参考文献3

  • 1[美]AndrewS Tanenbaum著 熊桂喜 王小虎 等译.计算机网络(第三版)[M].北京:清华大学出版社,1998.. 被引量:3
  • 2RFC#822.Srandard for the Format of Arpa Internet Text Messages[S].August 13,1982 被引量:1
  • 3Douglas E.Comer.Computer networks and internets[M]. Prentice Hall,Inc.1998([美]Douglas E.Comer.计算机网络与互连网[M].北京:电子工业出版社.1998.4) 被引量:1

共引文献13

同被引文献21

  • 1吴璇,隋红建.负载均衡技术在防火墙系统中的应用[J].计算机应用,2003,23(z2):22-24. 被引量:6
  • 2王霜,修保新,肖卫东.Web服务器集群的负载均衡算法研究[J].计算机工程与应用,2004,40(25):78-80. 被引量:46
  • 3Kai Hwang &Zhiwei Xu,Scalable Parallel Computing Technology,Architectrue,Programming,Published by McGraw-Hill,May.2000. 被引量:1
  • 4Ananth grama,Anshul Gupta,George Karypis&Vipin kumar,Introduction to parallel Computing (Second Editon),Published by Pearson Education Ltd,2003. 被引量:1
  • 5NSS Group. Intrusion Detection and Vulnerability Assessment[R].Technical Report, NSS, Oakwood House, Wennington, Cambridge Shire, UK, 2000. 被引量:1
  • 6Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful Intrusion Detection for High-speed Networks[J]. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,2002:285-293. 被引量:1
  • 7Gokhale M, Dubois D, Dubois A, et al. Granidt: Towards Gigabit Rate Network Intrusion Detection Technology. Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-programmable Logic and Applications, 2002. 被引量:1
  • 8Chan P C, Wei V K. Preemptive Distributed Intrusion Detection Using Mobile Agents. Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), 2002:103 - 108. 被引量:1
  • 9MIT Lincoln Laboratory. DARPA Intrusion Detection Evaluation.http:∥www.11.mit.edu/IST/ideval, 1999. 被引量:1
  • 10林军.分布式入侵检测系统协同通信机制的研究与实现[M].武汉:华中科技大学,2002. 被引量:1

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部