The research on Data Flow Technology in Computer Network Security Monitoring

被引:0
|
作者
Yin XiaoHong [1 ]
机构
[1] Nanchang Inst Sci & Technol, Nanchang 330108, Jiangxi, Peoples R China
关键词
Network Security Monitoring; Distributed Data Stream; Cost Efficient Processing; Multi-query Optimization; Stream Cube;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the rapid development of computer technology and application of Internet is becoming more and more widely, the Internet plays a more and more important role in people's life. At the same time, all kinds of network security events emerge in endlessly, seriously threaten the application and development of the Internet. With the purpose of safety, network monitoring, have more and more important significance in the maintenance of normal efficiently network run, key facilities, information system security, etc.,. How to realize effective network transmission and efficient online analysis to a huge number of distributed network security monitoring data so as to provide further support for a variety of applications become a major challenge in the field of network security and data processing.
引用
收藏
页码:787 / 789
页数:3
相关论文
共 50 条
  • [1] The Research of Data Stream Technology in Computer Network Security Monitoring
    Li Li
    Hu ZhiYu
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1904 - 1907
  • [2] Research on Data Stream Technology in Computer Network Security Monitoring
    Xiong Wei
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1978 - 1981
  • [3] Research on Computer Network Security Based on Data Encryption Technology
    Zhang, Yicong
    Zhou, Shujun
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
  • [4] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [5] Research of Computer Network Security Technology
    Tan, Juan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 736 - 740
  • [6] Research on computer network data security storage technology in the era of big data
    Zhang, Liying
    Gu, Xin
    Zhao, Qiang
    [J]. REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2024, 40 (02):
  • [7] Research on Applications of Data Encryption Technology in Security of Computer Network Communication
    Li, Na
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 136 - 139
  • [8] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    [J]. MODERN COMPUTER SCIENCE AND APPLICATIONS II (MCSA 2017), 2017, : 13 - 18
  • [9] Research on the Application of Data Encryption Technology in Computer Network Communication Security
    Xia, Kuiliang
    Song, Xiaoming
    [J]. 2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020), 2020, : 164 - 167
  • [10] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 436 - 439