Abstract
Through analyzing the common problems in the operation and maintenance of the network, the article puts forward a monitoring system of network content safety and some new requirements of network management. This system highlights such three functions as the content monitoring, the visualization of the amount of flow and behavior examination, and presents the content display and supports different configuration through friendly and feasible interfaces. This article introduces primarily the main functions, characteristics and embodiment of the system as well as its system disposition.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Moore, A.W., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41–54. Springer, Heidelberg (2005)
Karagiannis, T., Broido, A., Faloutsos, M., et al.: Transport layer identification of P2P traffic. In: Proc. of the 4th Internet Measurement Conference, Taormina, Italy, pp. 121–134 (2004)
Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable network identification of P2P traffic using application signatures. In: Proc. of WWW 2004, New York, pp. 512–521 (2004)
Kang, H.J., Kim, M.S., Homg, J.W.: Streamingmedia and multimedia conferencing traffic analysis using payload examination. ETRI Journal 26(3), 203–217 (2004)
van der Merwe, J., Caceres, R., Chu, Y.-H., et al.: Mmdump: a tool formonitoring Internetmultimedia traffic. ACM Computer Comm. Review 30(4), 48–59 (2000)
Moore, A.W., Zuev, D.: Internet traffic classification using Bayesian analysis techniques. In: Proc. of ACM SIGMETRICS 2005, pp. 50–60 (2005)
Zuev, D., Moore, A.W.: Traffic Classification Using a Statistical Approach. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 321–324. Springer, Heidelberg (2005)
Moore, A.W., Zuev, D.: Discriminators for use in flow-based classification. Intel Research, Cambridge (2004)
Postel, J.: Transmission Control Protocol. Information Sciences Institute, U. O. S. C. Transmission Control Protocol (September 1981)
Duffield, N.G., Lewis, J.T., O’Connell, N., Russell, R., Toomey, F.: Entropy of ATM traffic streams. IEEE Journal on Selected Areas in Communications 13(6), 981–990 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gu, J., Xiao, B., Gu, Z. (2012). Network Content Safety Design of Monitoring System. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-34041-3_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34040-6
Online ISBN: 978-3-642-34041-3
eBook Packages: Computer ScienceComputer Science (R0)