Windows和Linux家族操作系统的网络和系统管理自动化系统

E. Basinya
{"title":"Windows和Linux家族操作系统的网络和系统管理自动化系统","authors":"E. Basinya","doi":"10.17212/1814-1196-2018-4-47-58","DOIUrl":null,"url":null,"abstract":"Today, the automation of technological and business processes of an enterprise is one of the key trends in the development of information and communication technologies. As part of the development of management methodology and organization of services in this area, Helpdesk and ServiceDesk user support systems are becoming increasingly popular. However, most existing solutions do not consider the vulnerabilities of the TCP/IP protocol stack as well as the imperfection of software and operating systems, which often complicates the activities of information technology departments by loading them with routine work. This article presents the development of an automated system of network and system administration of Windows and Linux family operating systems, which includes the Helpdesk and ServiceDesk solutions functionality. The signature method of the system operation with the identification of the correlation of events is reviewed. An original approach to creating a knowledge base of the system is described. The solution was implemented using a platform for automated deployment and management of applications in a virtualization environment, which provides an additional level of reliability and fault tolerance. An algorithm for checking third-party software solutions for suspicious malicious activity is proposed, providing a qualitative analysis of the object being investigated: whether functions undeclared by the developer are present, whether any information is being sent to third parties, etc. A comprehensive approach to the management of the enterprise network infrastructure is presented. In order to ensure information security of network communications, encapsulated secure virtual communication channels were used. To ensure the confidentiality of data on the client side, the AES-256 encryption algorithm was used. The proposed approaches are recommended for corporate computer networks which include ten or more hosts operating on the basis of the TCP / IP protocol stack and Windows / Linux family operating systems.","PeriodicalId":214095,"journal":{"name":"Science Bulletin of the Novosibirsk State Technical University","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An automated system of network and system administration of Windows and Linux family operating systems\",\"authors\":\"E. Basinya\",\"doi\":\"10.17212/1814-1196-2018-4-47-58\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, the automation of technological and business processes of an enterprise is one of the key trends in the development of information and communication technologies. As part of the development of management methodology and organization of services in this area, Helpdesk and ServiceDesk user support systems are becoming increasingly popular. However, most existing solutions do not consider the vulnerabilities of the TCP/IP protocol stack as well as the imperfection of software and operating systems, which often complicates the activities of information technology departments by loading them with routine work. This article presents the development of an automated system of network and system administration of Windows and Linux family operating systems, which includes the Helpdesk and ServiceDesk solutions functionality. The signature method of the system operation with the identification of the correlation of events is reviewed. An original approach to creating a knowledge base of the system is described. The solution was implemented using a platform for automated deployment and management of applications in a virtualization environment, which provides an additional level of reliability and fault tolerance. An algorithm for checking third-party software solutions for suspicious malicious activity is proposed, providing a qualitative analysis of the object being investigated: whether functions undeclared by the developer are present, whether any information is being sent to third parties, etc. A comprehensive approach to the management of the enterprise network infrastructure is presented. In order to ensure information security of network communications, encapsulated secure virtual communication channels were used. To ensure the confidentiality of data on the client side, the AES-256 encryption algorithm was used. The proposed approaches are recommended for corporate computer networks which include ten or more hosts operating on the basis of the TCP / IP protocol stack and Windows / Linux family operating systems.\",\"PeriodicalId\":214095,\"journal\":{\"name\":\"Science Bulletin of the Novosibirsk State Technical University\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Science Bulletin of the Novosibirsk State Technical University\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17212/1814-1196-2018-4-47-58\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Science Bulletin of the Novosibirsk State Technical University","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/1814-1196-2018-4-47-58","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

今天,企业的技术和业务流程的自动化是信息和通信技术发展的关键趋势之一。作为这一领域管理方法和服务组织发展的一部分,Helpdesk和ServiceDesk用户支持系统正变得越来越受欢迎。然而,大多数现有的解决方案没有考虑到TCP/IP协议栈的漏洞以及软件和操作系统的不完善,这往往使信息技术部门的日常工作变得复杂。本文介绍了Windows和Linux家族操作系统的网络和系统管理自动化系统的开发,其中包括Helpdesk和ServiceDesk解决方案功能。综述了基于事件相关性识别的系统运行签名方法。描述了一种创建系统知识库的原始方法。该解决方案是使用虚拟化环境中自动部署和管理应用程序的平台实现的,该平台提供了额外级别的可靠性和容错性。提出了一种检查第三方软件解决方案是否存在可疑恶意活动的算法,对被调查对象进行定性分析:是否存在开发人员未声明的功能,是否有任何信息被发送给第三方等。提出了一种管理企业网络基础设施的综合方法。为了保证网络通信的信息安全,采用了封装的安全虚拟通信通道。为了保证客户端数据的机密性,使用了AES-256加密算法。建议的方法适用于包括10台或更多主机的公司计算机网络,这些主机基于TCP / IP协议栈和Windows / Linux家族操作系统运行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An automated system of network and system administration of Windows and Linux family operating systems
Today, the automation of technological and business processes of an enterprise is one of the key trends in the development of information and communication technologies. As part of the development of management methodology and organization of services in this area, Helpdesk and ServiceDesk user support systems are becoming increasingly popular. However, most existing solutions do not consider the vulnerabilities of the TCP/IP protocol stack as well as the imperfection of software and operating systems, which often complicates the activities of information technology departments by loading them with routine work. This article presents the development of an automated system of network and system administration of Windows and Linux family operating systems, which includes the Helpdesk and ServiceDesk solutions functionality. The signature method of the system operation with the identification of the correlation of events is reviewed. An original approach to creating a knowledge base of the system is described. The solution was implemented using a platform for automated deployment and management of applications in a virtualization environment, which provides an additional level of reliability and fault tolerance. An algorithm for checking third-party software solutions for suspicious malicious activity is proposed, providing a qualitative analysis of the object being investigated: whether functions undeclared by the developer are present, whether any information is being sent to third parties, etc. A comprehensive approach to the management of the enterprise network infrastructure is presented. In order to ensure information security of network communications, encapsulated secure virtual communication channels were used. To ensure the confidentiality of data on the client side, the AES-256 encryption algorithm was used. The proposed approaches are recommended for corporate computer networks which include ten or more hosts operating on the basis of the TCP / IP protocol stack and Windows / Linux family operating systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信