Design and Implementation of Cluster Monitoring on Information Security Audit System

被引:0
|
作者
Shao, Zuozhi [1 ]
Zeng, Geng [1 ]
Gong, Rui [1 ]
Li, Yunpeng [1 ]
Zhang, Kuo [1 ]
机构
[1] North China Elect Power Univ, Dept Control & Comp Engn, Beijing, Peoples R China
关键词
information security audit system; server cluster; monitoring; data acquisition; data analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper puts forward the basic thought of designing cluster monitoring system. Firstly, the daemon running on each server node collect the specific monitoring information and then send processed information to cluster control and processing module. Secondly, the cluster control and processing module receives the processed data, then the data is made some corresponding processing and sent to the visual page to display. At the same time, the module sends the data to the data storage module for storage, so that statistics and analysis of the data later. Then the paper designs the system architecture, and analyses data acquisition module and data analysis and fault detect module in detail. At last, it proves that the monitoring system can meet the demand well through an experiment.
引用
收藏
页码:718 / 721
页数:4
相关论文
共 50 条
  • [11] The Fourth Dimension of Information System Audit and Security
    Aggarwal, Akshai
    Kanhere, Sujata
    Kanhere, Vishnu
    Kanhere, Shankar
    SEPADS'09: PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2009, : 162 - +
  • [12] AUDIT AND INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION
    Drastich, Martin
    SBORNIK Z MEZINARODNI VEDECKE KONFERENCE ZNALOSTI PRO TRZNI PRAXI 2012: VYZNAM ZNALOSTI V AKTUALNI FAZI EKONOMICKEHO CYKLU, 2012, : 49 - 52
  • [13] Design and implementation of log audit system
    Huang, Yihai
    Hu, Jun
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (22): : 67 - 68
  • [14] DESIGN AND IMPLEMENTATION OF THE INDUSTRIAL PRODUCTION INFORMATION MANAGEMENT MONITORING SYSTEM
    Chen, Zhenya
    Yang, Ying
    Chen, Lijuan
    Wang, Chunxiao
    Xu, Mei
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 52 - 55
  • [15] Design and Implementation of Modules to Prevent Tampering in Monitoring System to Enhance Security
    Pratap, Abhay
    Chauhan, Mukul
    Sonika
    Dixit, Anurag
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 458 - 462
  • [16] Design and Implementation of Basic Public Security Organizations Information Analysis System
    Li, Na
    Du, Yanhui
    Chen, Guangxuan
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 594 - 599
  • [17] Implementation of network information security monitoring system based on adaptive deep detection
    Niu, Jing
    Alroobaea, Roobaea
    Baqasah, Abdullah M.
    Kansal, Lavish
    JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 454 - 465
  • [18] IMPLEMENTATION OF INFORMATION SECURITY MANAGEMENT SYSTEM
    Drastich, Martin
    PROCEEDINGS OF THE 10TH INTERNATIONAL SCIENTIFIC CONFERENCE: ECONOMIC POLICY IN THE EUROPEAN UNION MEMBER COUNTRIES: SELECTED PAPERS, 2013, : 49 - 55
  • [19] The Design and Implementation of a Certain Information System Joint Debugging and Status Monitoring System
    Wei, Zhang
    Qiu Chuanfei
    Cheng Huihua
    Zhou Quanzhi
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 2059 - 2062
  • [20] Open Source Security Information Management System Supporting IT Security Audit
    Hermanowski, Damian
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2015, : 336 - 341