Design and Implementation of Cluster Monitoring on Information Security Audit System

被引:0
|
作者
Shao, Zuozhi [1 ]
Zeng, Geng [1 ]
Gong, Rui [1 ]
Li, Yunpeng [1 ]
Zhang, Kuo [1 ]
机构
[1] North China Elect Power Univ, Dept Control & Comp Engn, Beijing, Peoples R China
关键词
information security audit system; server cluster; monitoring; data acquisition; data analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper puts forward the basic thought of designing cluster monitoring system. Firstly, the daemon running on each server node collect the specific monitoring information and then send processed information to cluster control and processing module. Secondly, the cluster control and processing module receives the processed data, then the data is made some corresponding processing and sent to the visual page to display. At the same time, the module sends the data to the data storage module for storage, so that statistics and analysis of the data later. Then the paper designs the system architecture, and analyses data acquisition module and data analysis and fault detect module in detail. At last, it proves that the monitoring system can meet the demand well through an experiment.
引用
收藏
页码:718 / 721
页数:4
相关论文
共 50 条
  • [1] Design and Realization of Network Security Audit and Monitoring System
    Wang Yilei
    Gao Xianfeng
    Tao, Li
    Sun Yujuan
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1-2, 2008, : 1029 - 1032
  • [2] The Design and Implementation of the Information Remote Monitoring and Security Management System based on Internet
    He Chunlin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1414 - 1417
  • [3] Design and implementation of tailings dam security monitoring system
    Jun Hu
    Liu, Xingzong
    ISMSSE 2011, 2011, 26
  • [4] Design and implementation of intranet security audit system based on load balancing
    Chen, Baixing
    Fu, Xiufen
    Zhang, Xiayu
    Su, Lei
    Wu, Dan
    GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 588 - 591
  • [5] Design and Implementation of Enterprise Network Information Monitoring System
    He, Xingao
    Yao, Bo
    Gao, Wei
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II, 2009, : 326 - 330
  • [6] A Security Audit Framework to Manage Information System Security
    Pereira, Teresa
    Santos, Henrique
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 9 - +
  • [7] Design and Implementation of Security Audit System for Nuclear Safety-Class DCS
    Feng, Shi-man
    Zhao, Wen-yue
    Peng, Hao
    Luo, Xiao-jun
    Yao, Ying-fan
    NEW ENERGY POWER GENERATION AUTOMATION AND INTELLIGENT TECHNOLOGY, VOL 2, 2024, 1250 : 216 - 231
  • [8] Indoor Security System Design and Implementation using Depth Information
    Farhad, M. M.
    Hossain, S. M. Nafiul
    Ahmad, Mohiuddin
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2013,
  • [9] Implementation of security information system
    Cui, JS
    Li, TK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 42 - 47
  • [10] The Design of Teaching Management Information System Based on Oracle Security Audit Technology
    Xia Sailian
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 687 - 689