{"title":"利用入侵检测系统监控互联网接入及带宽使用情况","authors":"D. Rajagopal, K. Thilakavalli","doi":"10.4172/2090-4886.1000119","DOIUrl":null,"url":null,"abstract":"New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. It takes advantage of the very fact that the majority companies give web access through proxy servers, like MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS Proxy, WinProxy, EServ, Squid, Proxy Plus, and others. Whenever the user accesses several websites, transfer files or pictures, these actions were logged. The system processes these log files to supply system directors a good vary of report-building choices. It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies, paying attention to music, and working). This technique might produce comprehensive reports with analysis of overall information measure consumption, building easy-to-comprehend visual charts that show the areas wherever wasteful information measure consumption has eliminated. This new approach is employed to observation the web information measure employed by the user. victimization this technique will simply decide that user fill the information measure most heavily, when, and what specifically they transfer, what proportion time they pay on-line, and what knowledge transfer traffic they produce.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000119","citationCount":"3","resultStr":"{\"title\":\"Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System\",\"authors\":\"D. Rajagopal, K. Thilakavalli\",\"doi\":\"10.4172/2090-4886.1000119\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. It takes advantage of the very fact that the majority companies give web access through proxy servers, like MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS Proxy, WinProxy, EServ, Squid, Proxy Plus, and others. Whenever the user accesses several websites, transfer files or pictures, these actions were logged. The system processes these log files to supply system directors a good vary of report-building choices. It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies, paying attention to music, and working). This technique might produce comprehensive reports with analysis of overall information measure consumption, building easy-to-comprehend visual charts that show the areas wherever wasteful information measure consumption has eliminated. This new approach is employed to observation the web information measure employed by the user. victimization this technique will simply decide that user fill the information measure most heavily, when, and what specifically they transfer, what proportion time they pay on-line, and what knowledge transfer traffic they produce.\",\"PeriodicalId\":91517,\"journal\":{\"name\":\"International journal of sensor networks and data communications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-01-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.4172/2090-4886.1000119\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of sensor networks and data communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4172/2090-4886.1000119\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of sensor networks and data communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4172/2090-4886.1000119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
摘要
入侵检测系统可以为企业网络提供一种全面的网络使用情况观察和新闻工具。它利用了大多数公司通过代理服务器提供网络访问的事实,如MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS proxy, WinProxy, EServ, Squid, proxy Plus等。每当用户访问多个网站,传输文件或图片时,这些操作都会被记录下来。系统处理这些日志文件,为系统管理员提供多种报表构建选择。它可以为个人用户构建报告,显示访问过的网站列表,以及详细的网络活动分类(下载、阅读文本、观看录像、观察电影、关注音乐和工作)。该技术可以生成综合报告,分析总体信息度量消耗,构建易于理解的可视化图表,显示已经消除了浪费信息度量消耗的区域。这种新方法被用来观察用户使用的网络信息度量。受害这种技术将简单地决定用户填写信息量最多,何时,以及他们具体转移了什么,他们在线支付的时间比例,以及他们产生的知识转移流量。
Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. It takes advantage of the very fact that the majority companies give web access through proxy servers, like MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS Proxy, WinProxy, EServ, Squid, Proxy Plus, and others. Whenever the user accesses several websites, transfer files or pictures, these actions were logged. The system processes these log files to supply system directors a good vary of report-building choices. It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies, paying attention to music, and working). This technique might produce comprehensive reports with analysis of overall information measure consumption, building easy-to-comprehend visual charts that show the areas wherever wasteful information measure consumption has eliminated. This new approach is employed to observation the web information measure employed by the user. victimization this technique will simply decide that user fill the information measure most heavily, when, and what specifically they transfer, what proportion time they pay on-line, and what knowledge transfer traffic they produce.