Font Size: a A A

Distributed System Security Analysis Of Unstructured Text Data Research And Design

Posted on:2011-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhuFull Text:PDF
GTID:2178330338489803Subject:Computer technology
Abstract/Summary:PDF Full Text Request
As an important media, the Internet might lead release, delivery and convenient access to freedom of information, while a variety of threatening social stability, involving the vital interests of the State of information such as the contents of the problems caused by the increasing emergence. Traditional network monitoring methods have been unable to adapt to the continuous development of content security needs. Internet supervision departments in the network data analysis, the retrieval process only concerned about the large structured text data. However, most of the Internet, data is unstructured data, resulting in the ability of such data are extremely limited supervision, especially in the growing network discovery and tracking all kinds of hacker attacks, the lack of a comprehensive system for network data The analysis and processing.To address the analysis of unstructured text data set and the database indexes Keywords gaps, this paper focus on the above-mentioned Internet content security, data analysis techniques to commence the study, the principal tasks are:(1) In-depth study of network security analysis of data related technologies, based on keyword matching problem for unstructured data to propose a modified KMP algorithm. Through the inspection, the improved algorithm, compare the number of KMP algorithm is about 60%.(2) According to the characteristics of unstructured text data to design a set of data analysis of non-structured text retrieval system. The system uses distributed technology is the Windows platform, has established a task-distribution server as the central task of computing the terminal processing unit, with feedback and fault-tolerant mechanisms for data security, Distributed System Security Analysis of unstructured text data Research and Design(3) Gives the system the detailed design of the various functional components to carry out a system implementation, and the system's overall functionality, computing speed and failure of each module has been tested. Tests show that the system set up an effective model of a normal string rules can detect suspicious data to achieve the desired design goals.In the realization of the system on the basis of the simulation experiment. Test results show that the system can be wrong in some cases the module stable operation to meet the needs in practical work. This research work not only for our future in the field of Internet content security research work provides a reliable theory, technical basis, but also has good value in engineering.
Keywords/Search Tags:Content security, Unstructured text data, Pattern matching, Safety Analysis
PDF Full Text Request
Related items